, 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:15 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000001780)}, 0x0) 21:58:15 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)) 21:58:15 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:15 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10c00b, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 657.977794] EXT4-fs (sda1): re-mounted. Opts: [ 658.019621] EXT4-fs (sda1): re-mounted. Opts: 21:58:15 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/stat\x00') fcntl$notify(r1, 0x402, 0x400000000000031) exit(0x0) getdents64(r1, &(0x7f0000000080)=""/57, 0x39) 21:58:15 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x7fffffe, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:15 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000001780)}, 0x0) 21:58:15 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:15 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x2001001, &(0x7f0000000040)=ANY=[]) rseq(&(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={0x0, 0x2, 0xffffffffffffff00, 0x6, 0x2}, 0x6}, 0x20, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)) r0 = geteuid() syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x8, &(0x7f00000006c0)=[{&(0x7f00000001c0)="32b8905f91d23b2e30f29b695808c8194464635cdadd32a6dae5c25e1e8b96a3d9bafcef4e50568c68e8996cf9207ab22bf5ea2d2eabd2bea559d6c4e8970b132fa76df6ed2d928451d49837", 0x4c}, {&(0x7f0000000240)="649bf6be7fb7c7c078ab5b6b63fa0052b5071f999f", 0x15, 0x10000}, {&(0x7f0000000340)="0b3bed69629dadfe8c91428f5a2c48d859f8483a4a301032a7967f7e26ae903e09d2ccc14be53ee9f2b28754bb726a32fccf72a8af964304b11c4b3ebecfc81a64dc300b59e585e48a7f330f6aad9bbc48a41c2a15283e229da646d56e8abef28ce63db385ceb4e18d75f8ef5bf52638421871baac3ce5130791240b314e23c25e062eaf115dfaac2a261ebb24b1f57d76", 0x91, 0x401}, {&(0x7f0000000280)="9c8244c0b096308b575c0749924054c8a15bebe7da122a872662a1567913e6d1a243ececdddfb5310e2d4d48e0eafa20ec00513fd6f4e5775abbf282dadb061f5961af5eeaedc9834c899528fdb306ec2a4886a2c0b016c5825d0f7236e4321f787bb899", 0x64, 0x3}, {&(0x7f0000000400)="1015", 0x2, 0x5}, {&(0x7f0000000440)="362f3484028cf5569fc6eff1b35168b6148923cb18a5a713e2b39d23724c1f516bfd55f69e4b9d1956e542507c1d97bfe4ade27737d1ca32e55fa4eb209e30152d99e2f531f3a1d8d6a9892992862c3cc7c6008828825467691b1791b04b831f879a8c70224ac09b8d2bb680e322693b01b8f1b28229f79c556af050783ef09f3c2a55ac7c1d4e1cfc679b82c5ec142599aadacaa6ba321879ee74b291d89170aee08310aef9c9352a018254bc0bdd9392c8c6c7cc110516a2ec77f9", 0xbc, 0x3}, {&(0x7f0000000500)="42f8bf9d69bfd0db27a9247e485e41a1881c62e30c9784cf32b0d9a3fb91a37d29151fc4c458ef4f70443311a0e6251372a06090b54c1ba7913d03115b729fcc70cfb1018f78fe01427dc76773e72b1a62b3ae5eb4fbf99cb3da4b5d7be6bbf71ab845372b64b74bd41438f941b1d713ba9294091dd11da6bafcd888fabae5ff977e566a6a1b601c9b49546e21a639d5d05e93904fd6623bccb9edb3751421bf49c372b3659a11b29710d7f9145e916c58326d2ffe8580de3dd59f94d36dfe88645b32bf3ba007863c8e360db8baa00785b8d5", 0xd3, 0x800}, {&(0x7f0000000600)="afe1e24ff6f4bbe2703b1794ba87ff624f623bc7c0c433c87e16b7777b44170104ccd4e03881784deb29a97e9c04023ca7c5334e02f1091d9716e9f6fae3cdd573c6d45fe607ec303ee289e86bb4f5995392c12ed5851d685604adb7f0cb301aebb211ac39d541b609c933ed49d529efef3b27d1da9d1cf9e179731eee42ce063d67cda3741da531398f0118f5158aa94869b03f43a44e6e35", 0x99, 0x3}], 0x100811, &(0x7f0000000780)={[{@largeio='largeio'}, {@barrier='barrier'}], [{@fowner_lt={'fowner<', r0}}, {@smackfsdef={'smackfsdef', 0x3d, "00f83f0080"}}]}) 21:58:15 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100013, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 21:58:15 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 658.656039] EXT4-fs (sda1): re-mounted. Opts: 21:58:15 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x300000000000000, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:16 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:16 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:16 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100018, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 21:58:16 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x400) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000001c0)={0xf000000, 0x1, 0x0, [], &(0x7f0000000080)={0x9909ca, 0x4e2, [], @value64=0x6}}) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)) r1 = fcntl$getown(r0, 0x9) ptrace$peek(0x1, r1, &(0x7f0000000200)) [ 658.934496] EXT4-fs (sda1): re-mounted. Opts: [ 658.987793] EXT4-fs (sda1): re-mounted. Opts: 21:58:16 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/stat\x00') fcntl$notify(r1, 0x402, 0x400000000000031) exit(0x0) getdents64(r1, &(0x7f0000000080)=""/57, 0x39) 21:58:16 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x600000000000000, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:16 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000001780)}, 0x0) 21:58:16 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:16 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10005c, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 21:58:16 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000300)=[0xfcf2, 0x4]) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x4, &(0x7f0000000400)=[{&(0x7f00000001c0)="627914a3551af9f6daf5a178d21be0ca203f2619ffb16cbbe7f8f26e1ea09e06a13905aa2c563b79444666483416d2ddce4f539257870273fba9c3adb479d8794bdb5858f6412cbe38592cc4370f6ac99a3b86b8b1559bc812c017657f0955bfd601b1", 0x63, 0x6}, {&(0x7f0000000240)="863bebe7d955626812c7242edbe8aa2e3ac1df043a3df6a857535ca9957a224710e30d96ac34114410df7fd434628bf07cf9d06b3e7187ba08e429b2792f3a7b9d8a83f553a51d2696ea4d630c495ddd70d93c256e1a9faded59a38a82cc33e466195e80e7f316a0907f06b6e03bfa49e0f274276df4cc09a9843cb9576a6609338182362b2eea2caebd5e3eeab81bff1e7d7b5747de573a8454d5890b0cfa3282bf014522e39522b4b5aadb57882ce7ad5b19daa099a024", 0xb8, 0x10000}, {&(0x7f0000000340)="d4516e9792c184a940c1c011c279a796c983fbd6971196ce6a49cf02468bfdad908195b25af298c6820274dd31c07401f2f886115bd3b7d39ca2a8507e95e834de39dff05dac073f9452a6cae7bf680c18fc1abc5f72cbbf1774dc1ea718c51aedd38c3e107eacb2218749f36aa412364b0bdf704a510b258a529dc37730922ee4c673df5b17b8f398e642a88eb9e4c4063bc239f7f48c5b7555f0da2ae4389762a0dabb86bca6ed", 0xa8, 0x8000}, {&(0x7f0000000080)="54c4e129747d216371eb7a69450bee31ce32ffc948b539bf4a90a8758b0ad031ba6f0d1a9970c2c6f59363cee8436430", 0x30, 0x94f4}], 0x100020, &(0x7f00000004c0)) 21:58:16 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:16 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x7802000000000000, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 659.538973] EXT4-fs (sda1): re-mounted. Opts: 21:58:16 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) r0 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000001780)}, 0x0) 21:58:16 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:16 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x104008, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 21:58:16 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) shmdt(0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) r0 = dup(0xffffffffffffff9c) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x20) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)) 21:58:17 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/stat\x00') fcntl$notify(r1, 0x402, 0x400000000000031) exit(0x0) getdents64(r1, &(0x7f0000000080)=""/57, 0x39) 21:58:17 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x8800000000000000, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:17 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:17 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) r0 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000001780)}, 0x0) 21:58:17 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000040)='./file0\x00', 0x0, 0x142, &(0x7f0000000700), 0x100020, &(0x7f0000000300)) 21:58:17 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10c01a, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 21:58:17 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:17 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x40000000, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:17 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) r0 = socket$inet6(0xa, 0x0, 0x8000000003c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000001780)}, 0x0) 21:58:17 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:17 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100002, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 21:58:17 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)) 21:58:18 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/stat\x00') fcntl$notify(r1, 0x402, 0x400000000000031) exit(0x0) getdents64(r1, &(0x7f0000000080)=""/57, 0x39) 21:58:18 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x88000000, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:18 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:18 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) r0 = socket$inet6(0xa, 0x3, 0x0) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000001780)}, 0x0) 21:58:18 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x108006, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 21:58:18 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0xa6a1, 0x10200) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000080)=0x0) mq_notify(r0, &(0x7f00000001c0)={0x0, 0xf, 0x0, @tid=r1}) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)) [ 661.379807] EXT4-fs: 6 callbacks suppressed [ 661.379819] EXT4-fs (sda1): re-mounted. Opts: 21:58:18 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x30) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)) 21:58:18 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:18 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x3, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:18 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100015, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 21:58:18 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) r0 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000001780)}, 0x0) 21:58:18 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 661.622057] EXT4-fs (sda1): re-mounted. Opts: 21:58:19 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x100000000000000, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:19 executing program 1: mkdir(&(0x7f0000000340)='./file0\x00', 0x8) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)) getrlimit(0xd, &(0x7f0000000040)) 21:58:19 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:19 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/stat\x00') fcntl$notify(r1, 0x402, 0x400000000000031) exit(0x0) getdents64(r1, &(0x7f0000000080)=""/57, 0x39) 21:58:19 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) r0 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev}, 0x1c) sendmsg(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000001780)}, 0x0) 21:58:19 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10400a, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 21:58:19 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:19 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x700000000000000, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:19 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) r0 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000001780)}, 0x0) 21:58:19 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x3000000, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:19 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:19 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) getsockname$unix(r0, &(0x7f00000001c0), &(0x7f0000000080)=0x6e) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)) 21:58:19 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10800a, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 21:58:19 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x7000000, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:19 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 662.598991] EXT4-fs (sda1): re-mounted. Opts: [ 662.659418] EXT4-fs (sda1): re-mounted. Opts: 21:58:20 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/stat\x00') fcntl$notify(r1, 0x402, 0x400000000000031) exit(0x0) getdents64(r1, &(0x7f0000000080)=""/57, 0x39) 21:58:20 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000140), 0x1c) ioctl$int_in(r0, 0x5421, &(0x7f0000000340)=0x8000401) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x11a) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000300)) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='pagemap\x00') sendfile(r0, r1, &(0x7f0000000600), 0x1b400) setxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='security.evm\x00', &(0x7f0000000280), 0x1, 0x0) 21:58:20 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x11000000, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:20 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:20 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f0000000080)) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)) 21:58:20 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x108005, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 663.286049] EXT4-fs (sda1): re-mounted. Opts: 21:58:20 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x600, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:20 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 663.350124] EXT4-fs (sda1): re-mounted. Opts: 21:58:20 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10c019, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 21:58:20 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x11, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:20 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:20 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000140), 0x1c) ioctl$int_in(r0, 0x5421, &(0x7f0000000340)=0x8000401) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x11a) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000300)) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='pagemap\x00') sendfile(r0, r1, &(0x7f0000000600), 0x1b400) setxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='security.evm\x00', &(0x7f0000000280), 0x1, 0x0) 21:58:21 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/stat\x00') fcntl$notify(r1, 0x402, 0x400000000000031) exit(0x0) getdents64(r1, &(0x7f0000000080)=""/57, 0x39) 21:58:21 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x1c0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)) r0 = getgid() pipe2(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f00000006c0)={0x95, 0x7d, 0x1, {{0x0, 0x6e, 0x32, 0xddd6, {0x84, 0x3, 0x1}, 0x0, 0x21c, 0x5, 0x200, 0x5, 'wlan1', 0x0, "", 0x5, "00f83f0080", 0x31, 'proc{}md5sum%em1security{)%bdevbdev}+lo%proc#bdev'}, 0x12, '](posix_acl_access', r3, r0, r4}}, 0x95) mq_notify(r2, &(0x7f0000000480)={0x0, 0x30, 0x7, @thr={&(0x7f0000000780)="0192f64f7764d02f14ea03ff522a0a47541ca7705e03241fcef9a9b734112a571b192aeaeb6562bb44c5ec881e98e0e895487f1b36f41b9704e59182342102e1bf80bb731a845084e13546b20f87f3e0c4d18c53cb55a0806e1d5dfd87f6293ab1a78d80015189c76ba7d71b6357e7938698a4da66052b972beb1f099f90c2ecbfc2", &(0x7f0000000840)="f062e2967ea49b7c70ed10022fc658b766862ed47b0cbccbd4faecc0bec784282038222363afe59d488b64d83f101414572173a5fa32af861e2487595a74ad28ec2927af65"}}) fstat(0xffffffffffffff9c, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x5, 0x1, &(0x7f0000000080)=[{&(0x7f0000000200)="af2171b9ce0c50b91f5da8c0166aa71540f2722cfc5098b6c4ef343c056709217d30a8e6a0bddb18fe6cf4641906f722b259071c40e5c8a0c6c3d0f46cd07cc259746780306cfbbe6c26308ddd79e0bd9c5dd456c201", 0x56, 0x7fffffff}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='nodiscard,gid=', @ANYRESHEX=r0, @ANYBLOB="2c67727071756f74612c646973636172643d3078303030303030303030303030303230302c646973636172642c736d61636b66736861743d76626f786e657430747275737465642c736d61636b66736861743d00f83f00802c7375626a5f757365723d2c646f6e745f6d6561737572652c61707072616973652c646566636f6e746578743d73746166665f752c7065726d69745f646972656374696f2c646f6e745f61707072616973652c6f626a5f757365723d73656c666367726f757026242d657468312d2d2c2d2d292c657569643e", @ANYRESDEC=r5, @ANYBLOB="2c00af2193d562fd8340005098c2d74b0b647a1d47103aebbb1bdc095268e6a9077d7d7aad78b6c9f688ffd7b6837927cc10c2d4b6b5c0c865405441d3c219a5c8a89c3d1464a627468ce676859c31131d314744a76322e783ea0df667291040b2b91869"]) r6 = add_key$keyring(&(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r7 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000980)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$negate(0xd, r6, 0x6, r7) 21:58:21 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:21 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x2, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:21 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000140), 0x1c) ioctl$int_in(r0, 0x5421, &(0x7f0000000340)=0x8000401) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x11a) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000300)) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='pagemap\x00') sendfile(r0, r1, &(0x7f0000000600), 0x1b400) setxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='security.evm\x00', &(0x7f0000000280), 0x1, 0x0) 21:58:21 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10c006, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 21:58:21 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0xfeffff07, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:21 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:21 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:21 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r1 = socket$nl_route(0x10, 0x3, 0x0) poll(&(0x7f0000000380)=[{r0}, {}], 0x2, 0x0) pread64(r0, &(0x7f00000001c0)=""/39, 0x27, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 21:58:21 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x20000, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:21 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x104012, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 664.486969] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 664.977808] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:58:22 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/stat\x00') fcntl$notify(r1, 0x402, 0x400000000000031) exit(0x0) getdents64(r1, &(0x7f0000000080)=""/57, 0x39) 21:58:22 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:22 executing program 1: mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x103) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$DRM_IOCTL_ADD_BUFS(r0, 0xc0206416, &(0x7f0000000080)={0x18000000, 0x101, 0x1, 0x10000, 0x4, 0x2}) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)) 21:58:22 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x3f000000, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:22 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100011, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 21:58:22 executing program 4: mkdir(&(0x7f0000004080)='./file0\x00', 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:/llb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, &(0x7f0000000140)='\x00') openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0xf, 0x1fffff) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) 21:58:22 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x8800, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:22 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 665.177323] libceph: connect [d::]:6789 error -101 [ 665.183866] libceph: mon0 [d::]:6789 connect error [ 665.219447] libceph: connect [d::]:6789 error -101 [ 665.224477] libceph: mon0 [d::]:6789 connect error [ 665.259410] libceph: connect [d::]:6789 error -101 21:58:22 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x72, 0x8006) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)) 21:58:22 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000080), &(0x7f00000001c0)=0x8) [ 665.273139] libceph: mon0 [d::]:6789 connect error 21:58:22 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10c014, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 21:58:22 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 665.380484] EXT4-fs (sda1): re-mounted. Opts: [ 665.445936] EXT4-fs (sda1): re-mounted. Opts: 21:58:23 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/stat\x00') fcntl$notify(r1, 0x402, 0x400000000000031) exit(0x0) getdents64(r1, &(0x7f0000000080)=""/57, 0x39) 21:58:23 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x278, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:23 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:23 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x89f0, &(0x7f0000000340)={'ip6gre0\x00', @random="00e07000"}) 21:58:23 executing program 1: r0 = open(&(0x7f0000000080)='\x00', 0x4000, 0x10) write$UHID_INPUT2(r0, &(0x7f0000000340)={0xc, 0x1000, "8192c835e270d75f6b2bf8f575ca6d008297eff2fb7b072cbdeb1427eae799913c603ac8f65b9684c3b958fe67076dff2f9ce12954e6371b8c63429f04044dac591c40c0a673adae5108491679ccbc848bbb1d47a90e0452fba22fea0a4e4084f542d8294664f484da057221029e580090d08020bd5127629ac67e90e3715a0e3648fa90cffe8363092e13e557cc351b3822b7c284338553749c62765a466f39bf9a7591921782cf1f296314de47a6a217a3a877a2b672753216022336b74aaab4b0bba4a933848bd8ea4846e0bb035fbfd3ec739e478bd67fb10dbdb984da8823542f985277fbd53190914f62afda982aac1e9af021bcbbf51cabf74d6809757bcae44c143862759d3cec2305a9ef0566024d3c5067c05c40a071aa04fdbd4dc5532442bd511b889ada4812afe111d443e4eebaca48e55ef06a917461bfef0186c841bc8f5911cf4678824b3e95c63a6c1b8fa10696d58f44d0ade493e9b9cd87ba8276fe0f95322776aeebb6df482c45b40a5d52679d16a73eb557bf4b2abcd8d0e1943415739b0895f92d170195e16790bca7b9bc28aa126f1647eaf5f2d45351cd60b6ca11dda0851d2ad6eb808f79561e8399752165b9a3c2abe599d99f5a6f086c3a0e940162bb73d69db6c59b5ed7d207eadd7ce4bd326ba40b93f0dd7596c9e04556acac9d57735cc77128011687aac2c4cd5728476970e40e153f7e9cbe7c127b6386f62cbd5cbf4c7cc3bd14c6d42ccd8b81bfe0653b246fe2672ffa8b2930f6f7d28766fe07cc7b45ccf5d5ec47981973b4b26f3208e5c2f0f0a4c8f3e8ab14caf93c1d6099619defa57166b6a584026df26829e7480a38623d48cc34517212def541ba3cc522ae01ea3c6476ac7ef1063c521d3c9e99d35071858d7f7d01b9e8eb60d0003d1d5f2d4a5959baf9357b6b31fffe4a34fd3265aeeefea850631b666a79b35b868f14a7797d907199766ebb1d0c7fcf702878167076d1517f64e88dfafc6a2bc4c5493e996a70db8fc6bd61712ec8e14b5748f7c5fbe45968a1056d408612d018c37140ae28ff2d594d14cbaa214900cdcda236aae89b8c193dd9479d7752aa7d4e2bb5b7572245351ec8edd9b80c2fe192779627776ed06a7d6052175aaa29ab1be073412602e7fec87882ce523873bbc05055cdf04904849a101448e64201826a959c881a50e78dd8cdd186ef59c857e7c9a665203c4b02babc64e290a4160b4db42768a44a1a70a2d9d33a36e12ce7ca206b4faf8f89b86acf0c8ed72d664e4e7be424b5697c39474a9e47dccb62759fdd4e2fd0219a76898f8c3a787881967393f9a01b0a8e4a56faf1f6af4a61401979ce74013812e7978603ed45832eba2707c143b52adbafd2cb85a4a23b2082841073fa723a5170c4db30fd79c3c10f6359ddd92d8ca000225d2d1852f5281803b96315027acd8d0f1825a84aa6672aa3b922c5233fba0fb3b2faac561a155563e8055412c62bb1702d5def3b7380067e493c32864f40d7545add36d48d16cdb6aed050b6bdcbc7431e252f6ca9abcf83317957e378f4c64868683d904fb3e6917fd41b25d8cdf9083c53c7b2acb588a4648c6479e61078d0463e24c3f5df3b7b301c56632f734b6799ab5aa035e8f9630fed60249cd722d1dd83befe09354c103e6b88eda852284e1243da643c65c3128e82c09586c71e79f682f56460c18bced6d0416d4f5b005c34ef32b1ec0f84ee1a640ad977e591d89ec2560b8122c88d787946d135a7dc68bbb7e675a3783ee2b15acc532d3387eb2f0d30fbc3f8be41c907ccd8d5dc041c89c7a7ccae7bb82caa33e1a5731344fbca35322819178fa3ba2a989775bf1ef840adf71681dfda9fa1826fc5ed56f16fd19e8bb71dbfd84e750e3816dfb8e1ddc29a6348a5a5da3ff75df94fe31619dc0fc946786c767971badc61f3709231a09005e0903bcc021246372b3e6a0eebc2f5150cd4e18d48ff3a8b04d24a518dd8225d98ceeca1fb1bee7142594a2d3bc4e968fd9313f0a949b9ddddaa29217233e6266901008b9fe1adc785d9d4352bf5209832342d944c8cb8f3a3fde18981dbddd812997b6b0f40f63e748b87c0feda2f6f2613ded4d9a45a69139a632f5060e42c998371d07043729c2eb04e6fef26070294b2d719171b30e12beeeea4bc17786a85a87c5a6b523a6922d7661f33fe0d7f77f12dee9432fa1e3419b85aabcaffb87bb657d43f9664fde0c3732491ea7de54f32370464eb129cf5a9175e1acd9fcf174f782c23312c4f3bc4b6e0da3e0bdbed5871bda993a20c5f731d70263102b713eddf961933947fffa0ad7f45e49a3c5cfaa59130ea179b4af2691c7e191fe4518054e70b913b6c11541222a6e7b6583125e4ba58a9eb3e28002512715ae918d4a63fe274dbc210c1569ef06adb9b24b7b9b4e61c1fb6c8ed5ea6ce3e6749e74bdfe9b538b0181c6d8a0d595ac71a029b0879b6e63f5c4da1a3ffd32898858a0f5bfcd737e991bb8eb07185012ee4a32ba3b8bee1afaffa89d60276be016ae166d1179a2ba69df176b2b60c1db2996dcfe56a082941227cd67233677c68ed3f316301b1ddaf9605f8abff4933498d55c4fcd91f62b70fabce156a508d4ca2645af3ab75e61645dff022dc9e494adad0cbdb47376eed39f82711a0bbfc6406b2a79bd32aea53c783b2d387616cf16735e02d056f3ad35d2c17755fcc7786919253ddda8030d16d866038485b8b50b7ab9b6e402c3681a07383f00cf3ff688219a1d7cbbff94f07e48e0b173eee80232f91401db8542eb8240431e8d090fae17cb4f286b6f96356e106586c9191347d56bb2d6c32b4733b1deeb7db9b327c25b2d088a974d1d4b19fa6ecd13b971100831d224ca620f0c66f65b7d1e4b8e7544ea42b2f589f8e7734d35e0c2d6bde9a9d1693656327e49941ee573b37e8fb8bab074b5179491f8097085e333141abd713530f37db563719aa9f5bdb4fa9177627d935cd4a63d5533e5b1c855a76944e3616320cc29016f771cddec799b6c2b560794735b389a8575bcf8e31d4b909e37da4d58a685de572fb9d6a2e322b6ca9e2eb370244069ed13eef8a99f1b7f56be1c58ae13e6b426d6330779663282b1fcefb149a645e62d0dc383ad0e7310a436f72129574529b5c6758ab7c3d6ff138371d71d736ece8aeb8c5b1b12db42b363d775983b6a110ffa1d46f74eaabb018ced7101578c4f0e04d7101d98283e8d557d8b542011ebd13d9a0ccfe4295802ad42a5c05c081e30087c504a83bbf540b0c0759124c7755566593792d4a95b5c5e57cff499e13400107cbfbb195ff02fd27b3810138b8a56d213a07315bc9c736e66f4fe66ec4e8f2a75a10e0dc7d8ebba1cb92f3aefa12cfdd145e92435be176b5072dcd38682e086d2384eae44c4f2f8546e3505ef4ac252ece03f6ad3da74915e1a5876718f4ea6aa79cb3617cb9c26ddec55765fb154aa0535ada273d5959c6d57000c754b1215d860c16dfae03fbeaa9434b0851975bf8edd9f5cc4b38bdeb0b463d7fc8191f0f3ae00ce82fd726186522e0110a4a14c52d257e29b446bd891a51dab4870f9760d91dcbff3a625cb43d173d4bfa6464633d7df4d9eb0502762ea4743b5126a2a1e4b70aedc2b9b0bc15471559ef390805b9add43835a0d0c0fe8e100bb0ce375dbdff0bbe7e130b8112e931fd124f5df0bea797e31224b5ceaf5df6d30c6a44140e0b42c96dc94b5309bbf5075f8b57585f2cf599c3d1dd60ccfaea933c7147a23c218cfe21f57e8c496d90f41d026ff6c55ebbd3dfd7fa37d0975d997e74432d8c0234385914bb9c241980dd9e319f89c682eb5d79f2e09ba3ab0fbb3a4f53a6bcd9b451bb8b906ff9e13390de4b22ef3b4da6cca264647532dff6d5b1a9f32b871eadaed62fb662c195af9a653a15bc7969123854d8b912506866e6b0dc880450c716351e1f288214fc9045f6f572c7d86f81f42a593058c9d87c9badcb419c9d0e6426e42f757489c419c7d7ae8dfa4c61f57adefbf1cd2dec7e02419df1cdb76adb88636cde48198244b11caf6f0bcc31e9b66f97e2e2922761f5edf29ccef198291acce77b8d83f15e15912043e4e00c4ed849989d75b00f7b77eb60131d5c0767b4edcfdee4b9de4761e993d6da1c696c22b3e6dbfa8c920ca4341e093af277f4bbd5ddffaeb9d1cf163feb967d34be5dfdff8ffb2aec0b8845c591d8fa9aa75e68eb3493ab2d975a09ce0a2d68044f1c10323140989cc6199cbfe6b945732631f21cd1e9aa59833eeb81d7d7c12e7dccea551f44970748fcc78e4fa5bc582cca8ef1164698d7a8ce62fcfa7cdc5f2aee538f78e6fdf314c3e4f71852f8d4ef4f2ff82644da9b14e1ce3309c32e7592dbb05ea11a80bbc743e1e1f6bdc8da594a2451051357f00efd894c56631ff235938fcf21f5f899f436cbc0b410492998302418cb4c1ffacf735b5a5156da4ce672141fce5eaa31f82db03b33c1289ceafa1192f954b3bdc5686bb1f365cccb30409d55be8fdc73c9e9f73020f094da2827eb35bf68eee3bd8f1ff4910fc8e2895a06e08aabae0bafa5dc8084ffa5897787cbc64be205e5e213e7d01dea38268f40223ac8945fa6172a967b15ad698a914e3d06b1be89052dba369e2edd7fa42ff911c91709b941b61cbd60c40463c362b525ff10bb69b088259bf82dd86c3e438a4381d1b2e944e76308b150a038b5147baadf1fe8dfde26a5a2301a088e457bbbf1945c9b76ba92e9937726344b4d2241b1df1503db156a61a91cf7b23731ed919efd0b1864c056f4ad65d55bb3e6086bb2aff7a40af52a3a2dc1337ce8b8aa8c5b7e492415f7766b21279beef4e8b00c56439443e76e4ac0045ec92e0e899265d90c84c7829f3bc7aa08a3c01c37a6b9a30a3306a95fb77b05a7a02cbdc5c4de978217a1fa1645b37d11916001610ca326ed5c182fa06ac436fcc369e0b1d850d16464c192146159fe47e33a463f8e442ef218ad4e3ded79132952f0c9d3f6b30224e1ac4a1c12d2ef55a869d0f699ebcfeec8c5c38b11cc5ca9f7423922215fb5b4fb3aa87439cdea2dd12773139dac7578147ddf809ef03213deb9a588d124aedc20b785a6f8c36489ea607bb5776dd7c37d06f4f9f87e6a6a4ee762c8190d96d124ac0b231231f0f8c1b30b64fc7c83b543a3f00d8eb9f1a8e1b1baddd55bfa2b95f5971eb90f3145142b51d708da8481c224bf29d9459e2aeaca6386c4616bf85e15feaeb22ca1fa1c910968d3b6b7df20dbb7909dc514016bc2b352ca3688c5ff2ca09d95833bbab7e95555f6e8f763ce379cca89a10ecf686bace7d320c3f54b074927cd1a0069bdeb05cbace9e2cbb8177e587ccc0bf2acb005777f2b99ed81f5201727e4aa341ae6cbf1fbe1e9c18dcf9008ab31c78165714c5a519fcb599977d17231ed4de0a99cccb1a9ed25009600208a87209e0817094e0253bfe63e0d7323f7ab356c47c0484336d70f2a5f9aaabdb3612f6193676904abaf8837efcd3748ab16b5de2f6eb2abc47d3f0da68d8d5d9349ae2a1ed12df24fee40fd54682ce7d770976a41491a67cf597f3b1a1375d4bec35b3f4c4da371cc93fa6ee11d38de52136cbcc45f351786c8754180fb3a2b69105b4898ad53c3f6f972b3c2f7849b0e844b2ae95c1ea9bbbd7de580690a21cad8c2446e36a0a1ffe151664187e42f1336abc8a9bd5c545df42a645839337594e8d279c998cc75973086f567923ab7ba2027d5aeb2c9e7ac312336cdf42b54d8922d8c4a61d7ab8fd0"}, 0x1006) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)) 21:58:23 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100004, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 21:58:23 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x2000000, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:23 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:23 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000000072, 0x0) [ 666.164126] EXT4-fs (sda1): re-mounted. Opts: 21:58:23 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:23 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x5000000, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:23 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10c003, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 666.258271] EXT4-fs (sda1): re-mounted. Opts: 21:58:24 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/stat\x00') fcntl$notify(r1, 0x402, 0x400000000000031) exit(0x0) getdents64(r1, &(0x7f0000000080)=""/57, 0x39) 21:58:24 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:24 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000001780)}, 0x0) 21:58:24 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0xfffffffffffffffc) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)) 21:58:24 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x7802, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:24 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10801f, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 21:58:24 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 667.053049] EXT4-fs (sda1): re-mounted. Opts: 21:58:24 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0xffffffff00000000, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 667.121240] EXT4-fs (sda1): re-mounted. Opts: 21:58:24 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@remote, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000440)=0xe8) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x2, &(0x7f00000002c0)=[{&(0x7f00000001c0)="03f7348727cba755e64eed7af7c7c086fdd3a0ba88a0045a", 0x18, 0x3}, {&(0x7f0000000200)="65cbba30f6f26a861ed10d9d8aa92a23f2087201e5ebf8866c94d274c233baab3f6eb31edb58001e544fe36f8c0bf0847800fa382840eb33a8fe47b7098ee80e06b6263b6d5d7fcaa44ce5b0425703cd519c39fc5272b9aadca1011c52fdf3e1cb4e58e022691a69e43c08688a8f554b066a997fe5355973a6bd6502bf2999a0580da6e8f5fd481c6842f94898a9b409518a42486da9acb85e22c0d2bb944e3facc6df6ef55672c18d25829da8cd414f432e70dd57cec5", 0xb7, 0xe908}], 0x2, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@usrquota='usrquota'}, {@discard_size={'discard', 0x3d, 0x6}}, {@nodiscard='nodiscard'}, {@integrity='integrity'}, {@umask={'umask', 0x3d, 0x1}}, {@errors_remount='errors=remount-ro'}], [{@uid_eq={'uid', 0x3d, r0}}]}) 21:58:24 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) r0 = epoll_create(0x7) dup(r0) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x900020, &(0x7f0000000300)) 21:58:24 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10800f, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 21:58:24 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 667.300620] EXT4-fs (sda1): re-mounted. Opts: [ 667.318866] EXT4-fs (sda1): re-mounted. Opts: [ 667.365456] EXT4-fs (sda1): re-mounted. Opts: 21:58:25 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:25 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x4000000, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:25 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x2) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000000)=ANY=[@ANYRESDEC=0x0]) prctl$setfpexc(0xc, 0x40001) 21:58:25 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100060, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 21:58:25 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/stat\x00') fcntl$notify(r1, 0x402, 0x400000000000031) exit(0x0) getdents64(r1, &(0x7f0000000080)=""/57, 0x39) 21:58:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@remote, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000440)=0xe8) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x2, &(0x7f00000002c0)=[{&(0x7f00000001c0)="03f7348727cba755e64eed7af7c7c086fdd3a0ba88a0045a", 0x18, 0x3}, {&(0x7f0000000200)="65cbba30f6f26a861ed10d9d8aa92a23f2087201e5ebf8866c94d274c233baab3f6eb31edb58001e544fe36f8c0bf0847800fa382840eb33a8fe47b7098ee80e06b6263b6d5d7fcaa44ce5b0425703cd519c39fc5272b9aadca1011c52fdf3e1cb4e58e022691a69e43c08688a8f554b066a997fe5355973a6bd6502bf2999a0580da6e8f5fd481c6842f94898a9b409518a42486da9acb85e22c0d2bb944e3facc6df6ef55672c18d25829da8cd414f432e70dd57cec5", 0xb7, 0xe908}], 0x2, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@usrquota='usrquota'}, {@discard_size={'discard', 0x3d, 0x6}}, {@nodiscard='nodiscard'}, {@integrity='integrity'}, {@umask={'umask', 0x3d, 0x1}}, {@errors_remount='errors=remount-ro'}], [{@uid_eq={'uid', 0x3d, r0}}]}) 21:58:25 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:25 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x1000000, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 668.065820] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 668.098940] EXT4-fs (sda1): re-mounted. Opts: 21:58:25 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:25 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) r0 = accept4$inet6(0xffffffffffffff9c, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x1c, 0x80800) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="4e0400c8", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000200)=0xc) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000240)={0x3, 0x1, 0x8000, 0x0, 0x2, 0x2, 0xda, 0x43, r1}, 0x20) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000280)=ANY=[@ANYBLOB="51c16dd92fbbf0e65737d1a7fc4f54fa8de4460aa24082914eef78143247d5c908e06f33f40d73d8f51bf479a4037b161bd39bc0dc9ced72014cd2ea7b4891b13d62d80f77"]) [ 668.127088] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 21:58:25 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x6, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:25 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10401d, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 21:58:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@remote, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000440)=0xe8) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x2, &(0x7f00000002c0)=[{&(0x7f00000001c0)="03f7348727cba755e64eed7af7c7c086fdd3a0ba88a0045a", 0x18, 0x3}, {&(0x7f0000000200)="65cbba30f6f26a861ed10d9d8aa92a23f2087201e5ebf8866c94d274c233baab3f6eb31edb58001e544fe36f8c0bf0847800fa382840eb33a8fe47b7098ee80e06b6263b6d5d7fcaa44ce5b0425703cd519c39fc5272b9aadca1011c52fdf3e1cb4e58e022691a69e43c08688a8f554b066a997fe5355973a6bd6502bf2999a0580da6e8f5fd481c6842f94898a9b409518a42486da9acb85e22c0d2bb944e3facc6df6ef55672c18d25829da8cd414f432e70dd57cec5", 0xb7, 0xe908}], 0x2, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@usrquota='usrquota'}, {@discard_size={'discard', 0x3d, 0x6}}, {@nodiscard='nodiscard'}, {@integrity='integrity'}, {@umask={'umask', 0x3d, 0x1}}, {@errors_remount='errors=remount-ro'}], [{@uid_eq={'uid', 0x3d, r0}}]}) 21:58:25 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 668.269008] EXT4-fs (sda1): Unrecognized mount option "QÁmÙ/»ðæW7ѧüOTúäF [ 668.269008] ¢@‚‘Nïx2GÕÉào3ô sØõôy¤{Ó›ÀÜœírLÒê{H‘±=bØw" or missing value 21:58:25 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 668.427965] EXT4-fs (sda1): re-mounted. Opts: 21:58:26 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/stat\x00') fcntl$notify(0xffffffffffffffff, 0x402, 0x400000000000031) exit(0x0) getdents64(r1, &(0x7f0000000080)=""/57, 0x39) 21:58:26 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x2000000000000, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:26 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x2800, 0x0) write$UHID_INPUT2(r0, &(0x7f0000000240)={0xc, 0x23, "30bd488caead45bc58867c70a005d4f38b9ba7ebc41f25373e07a50070d190234dbf02"}, 0x29) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file0\x00') symlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)='./file0\x00') syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)) 21:58:26 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:26 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100009, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 21:58:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x2, &(0x7f00000002c0)=[{&(0x7f00000001c0)="03f7348727cba755e64eed7af7c7c086fdd3a0ba88a0045a", 0x18, 0x3}, {&(0x7f0000000200)="65cbba30f6f26a861ed10d9d8aa92a23f2087201e5ebf8866c94d274c233baab3f6eb31edb58001e544fe36f8c0bf0847800fa382840eb33a8fe47b7098ee80e06b6263b6d5d7fcaa44ce5b0425703cd519c39fc5272b9aadca1011c52fdf3e1cb4e58e022691a69e43c08688a8f554b066a997fe5355973a6bd6502bf2999a0580da6e8f5fd481c6842f94898a9b409518a42486da9acb85e22c0d2bb944e3facc6df6ef55672c18d25829da8cd414f432e70dd57cec5", 0xb7, 0xe908}], 0x2, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@usrquota='usrquota'}, {@discard_size={'discard', 0x3d, 0x6}}, {@nodiscard='nodiscard'}, {@integrity='integrity'}, {@umask={'umask', 0x3d, 0x1}}, {@errors_remount='errors=remount-ro'}], [{@uid_eq={'uid'}}]}) 21:58:26 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:26 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x3f00000000000000, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x2, &(0x7f00000002c0)=[{&(0x7f00000001c0)="03f7348727cba755e64eed7af7c7c086fdd3a0ba88a0045a", 0x18, 0x3}, {&(0x7f0000000200)="65cbba30f6f26a861ed10d9d8aa92a23f2087201e5ebf8866c94d274c233baab3f6eb31edb58001e544fe36f8c0bf0847800fa382840eb33a8fe47b7098ee80e06b6263b6d5d7fcaa44ce5b0425703cd519c39fc5272b9aadca1011c52fdf3e1cb4e58e022691a69e43c08688a8f554b066a997fe5355973a6bd6502bf2999a0580da6e8f5fd481c6842f94898a9b409518a42486da9acb85e22c0d2bb944e3facc6df6ef55672c18d25829da8cd414f432e70dd57cec5", 0xb7, 0xe908}], 0x2, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@usrquota='usrquota'}, {@discard_size={'discard', 0x3d, 0x6}}, {@nodiscard='nodiscard'}, {@integrity='integrity'}, {@umask={'umask', 0x3d, 0x1}}, {@errors_remount='errors=remount-ro'}], [{@uid_eq={'uid'}}]}) 21:58:26 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10c007, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 21:58:26 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:26 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)=ANY=[@ANYBLOB='C']) 21:58:27 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/stat\x00') fcntl$notify(0xffffffffffffffff, 0x402, 0x400000000000031) exit(0x0) getdents64(r1, &(0x7f0000000080)=""/57, 0x39) 21:58:27 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x500000000000000, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:27 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:27 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x2, &(0x7f00000002c0)=[{&(0x7f00000001c0)="03f7348727cba755e64eed7af7c7c086fdd3a0ba88a0045a", 0x18, 0x3}, {&(0x7f0000000200)="65cbba30f6f26a861ed10d9d8aa92a23f2087201e5ebf8866c94d274c233baab3f6eb31edb58001e544fe36f8c0bf0847800fa382840eb33a8fe47b7098ee80e06b6263b6d5d7fcaa44ce5b0425703cd519c39fc5272b9aadca1011c52fdf3e1cb4e58e022691a69e43c08688a8f554b066a997fe5355973a6bd6502bf2999a0580da6e8f5fd481c6842f94898a9b409518a42486da9acb85e22c0d2bb944e3facc6df6ef55672c18d25829da8cd414f432e70dd57cec5", 0xb7, 0xe908}], 0x2, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@usrquota='usrquota'}, {@discard_size={'discard', 0x3d, 0x6}}, {@nodiscard='nodiscard'}, {@integrity='integrity'}, {@umask={'umask', 0x3d, 0x1}}, {@errors_remount='errors=remount-ro'}], [{@uid_eq={'uid'}}]}) 21:58:27 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10c00f, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 21:58:27 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)) 21:58:27 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:27 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0xfeffff0700000000, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:27 executing program 4: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x2, &(0x7f00000002c0)=[{&(0x7f00000001c0)="03f7348727cba755e64eed7af7c7c086fdd3a0ba88a0045a", 0x18, 0x3}, {&(0x7f0000000200)="65cbba30f6f26a861ed10d9d8aa92a23f2087201e5ebf8866c94d274c233baab3f6eb31edb58001e544fe36f8c0bf0847800fa382840eb33a8fe47b7098ee80e06b6263b6d5d7fcaa44ce5b0425703cd519c39fc5272b9aadca1011c52fdf3e1cb4e58e022691a69e43c08688a8f554b066a997fe5355973a6bd6502bf2999a0580da6e8f5fd481c6842f94898a9b409518a42486da9acb85e22c0d2bb944e3facc6df6ef55672c18d25829da8cd414f432e70dd57cec5", 0xb7, 0xe908}], 0x2, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@usrquota='usrquota'}, {@discard_size={'discard', 0x3d, 0x6}}, {@nodiscard='nodiscard'}, {@integrity='integrity'}, {@umask={'umask', 0x3d, 0x1}}, {@errors_remount='errors=remount-ro'}], [{@uid_eq={'uid'}}]}) 21:58:27 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x108010, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 21:58:27 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000040)=ANY=[@ANYRESDEC, @ANYRES64]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)) 21:58:27 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:28 executing program 4: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f00000002c0)=[{&(0x7f00000001c0)="03f7348727cba755e64eed7af7c7c086fdd3a0ba88a0045a", 0x18, 0x3}, {&(0x7f0000000200)="65cbba30f6f26a861ed10d9d8aa92a23f2087201e5ebf8866c94d274c233baab3f6eb31edb58001e544fe36f8c0bf0847800fa382840eb33a8fe47b7098ee80e06b6263b6d5d7fcaa44ce5b0425703cd519c39fc5272b9aadca1011c52fdf3e1cb4e58e022691a69e43c08688a8f554b066a997fe5355973a6bd6502bf2999a0580da6e8f5fd481c6842f94898a9b409518a42486da9acb85e22c0d2bb944e3facc6df6ef55672c18d25829da8cd414f432e70dd57cec5", 0xb7, 0xe908}], 0x2, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@usrquota='usrquota'}, {@discard_size={'discard', 0x3d, 0x6}}, {@nodiscard='nodiscard'}, {@integrity='integrity'}, {@umask={'umask', 0x3d, 0x1}}, {@errors_remount='errors=remount-ro'}], [{@uid_eq={'uid'}}]}) 21:58:28 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x78020000, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:28 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:28 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x108007, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 21:58:28 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/stat\x00') fcntl$notify(0xffffffffffffffff, 0x402, 0x400000000000031) exit(0x0) getdents64(r1, &(0x7f0000000080)=""/57, 0x39) 21:58:28 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x81, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x1, 0x0) select(0x40, &(0x7f00000000c0)={0x8, 0x2, 0x5, 0xb60, 0xe, 0x5, 0xd816, 0x7}, &(0x7f0000000100)={0x314018d, 0x3, 0x937f, 0x2, 0x7fff, 0xfffffffeffffffff, 0xff, 0x4}, &(0x7f0000000140)={0x4, 0xb83, 0x2, 0x6e, 0x8, 0x8, 0x8000, 0xe47b}, &(0x7f00000001c0)={0x0, 0x2710}) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') read(r2, &(0x7f0000000380)=""/245, 0xfffffffffffffdff) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r3, 0x810c5701, &(0x7f00000004c0)) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40046602, &(0x7f0000000640)=0x84000) syz_open_dev$dri(&(0x7f0000000480)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r3, 0x4048ae9b, &(0x7f0000000040)={0x0, 0x0, [0x9, 0x8, 0x9, 0xffffffffffff14af, 0x10000, 0x8, 0xff, 0xffff]}) linkat(r3, &(0x7f0000000680)='./file0\x00', r3, &(0x7f00000006c0)='./file0\x00', 0x1400) fcntl$getownex(r2, 0x10, &(0x7f0000000200)) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000000)={0x6, @multicast1, 0x0, 0x6000600, 'dh\x00', 0x20, 0x80000000, 0x17}, 0x2c) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x40, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f0000000740)={'broute\x00', 0x0, 0x0, 0x0, [], 0x10000000000000cd, &(0x7f0000000700)=[{}]}, 0xa0) getsockopt$inet_mreqn(r2, 0x0, 0x24, &(0x7f00000002c0)={@multicast1, @local}, &(0x7f0000000840)=0xffc0) syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/net\x00') openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.net/syz0\x00', 0x200002, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) perf_event_open(&(0x7f0000001000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000005000), 0x2}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000080)=0x8001) signalfd4(r5, &(0x7f0000000800), 0x8, 0x80000) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f000000d000), &(0x7f0000001000)=0xfea6) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0xc1105517, &(0x7f0000001000)) close(r0) recvmmsg(0xffffffffffffffff, &(0x7f0000006340)=[{{&(0x7f0000002840)=@l2, 0x80, &(0x7f0000002dc0)=[{&(0x7f00000028c0)=""/220, 0xdc}, {&(0x7f00000029c0)=""/214, 0xd6}], 0x2, &(0x7f0000002d40)=""/47, 0x2f}, 0x20000000000000}], 0x1, 0xffffffffffffffff, &(0x7f0000006400)={0x77359400}) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) 21:58:28 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:28 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x500, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:28 executing program 4: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000002c0)=[{&(0x7f00000001c0)="03f7348727cba755e64eed7af7c7c086fdd3a0ba88a0045a", 0x18, 0x3}], 0x2, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@usrquota='usrquota'}, {@discard_size={'discard', 0x3d, 0x6}}, {@nodiscard='nodiscard'}, {@integrity='integrity'}, {@umask={'umask', 0x3d, 0x1}}, {@errors_remount='errors=remount-ro'}], [{@uid_eq={'uid'}}]}) 21:58:28 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:28 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10c001, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 21:58:28 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x700, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:28 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:28 executing program 4: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x2, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@usrquota='usrquota'}, {@discard_size={'discard', 0x3d, 0x6}}, {@nodiscard='nodiscard'}, {@integrity='integrity'}, {@umask={'umask', 0x3d, 0x1}}, {@errors_remount='errors=remount-ro'}], [{@uid_eq={'uid'}}]}) 21:58:28 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x18583d6c0d442abd) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)) syz_mount_image$nfs4(&(0x7f0000000040)='nfs4\x00', &(0x7f0000000080)='./file0\x00', 0x5, 0x7, &(0x7f0000000540)=[{&(0x7f00000001c0)="72e78480834bd84559fba2b8239d2bdd1af406ec3ead645e48e505068166555050924ca87ed4fe48c271a99c45a4b3514ea08f29ca8a4ad88fc23a5b30d59c91bfe15af90cd4f6b31c83a3101f827e514e718e1700e18f213706b1181af223f4ac7710537c2b74dbcc5fd1ce81edb783f44f0c86", 0x74, 0x6}, {&(0x7f0000000240)="bbeb841fed9125abaf63a9e60af522fcdbc7c0656a78ce0209b982a4d8d0d487a56b7bb22bca3bda5e59aea4550d1641141b44021f", 0x35, 0xffffffffffffff39}, {&(0x7f0000000280)="69a04a1f46f6e7bd3a0ad5650d255cd53bf3d8126f32a0df0babe4", 0x1b, 0x8}, {&(0x7f0000000340)="93b7b99d5c983891d843af5368f53aabb4f8d7a45b7f9074c7076fc3256f6b5ef0f2e7d7ec30a9a2f2a186deefcd106284665c0ba8bb356ce6988e2310ad7bd6e1650e91f9ccd6c0d574a7f9283240d4edc5990b7df20a159db10cff9b31e87395f16840a0f4195197a4b906c87519722dd8d2ebe5ba6f3e3f17763735aed2928833b5c62717796f8733d59c9410fccc0d94972770c292e3ef3c0710c83f601ea06c690015a58c6e5ff6e8951fdad1fa0ef4f65c460fe0f5e4eeb1e8ca7fd9fc18bac4fab1", 0xc5, 0x7}, {&(0x7f0000000440)="182a90bb90d60cf0504583f9c64fb433a18b1224d067d8b3945c63fdd1ed5860c0dda7184e8fdb9e7d632edb0faa5899c003c10012fe49ae3946df7b7d751c5d032eca537cd0debc83b2968b639535f812552b54010af4e3f86724d8bcb869b35c47e47ff825db737e98bea982109f1f80e1511985fe4f7ba3d677381642336d7c604d26f566c529b2d2fc9efa28b4c259c9dee0120ba96fc2", 0x99, 0xfff}, {&(0x7f00000002c0)="4c27e74cf9802be2c5f76b3eb15e56a02dea73974c44d36a3bf28a185cd033d867f630b4", 0x24, 0x7}, {&(0x7f0000000500)="eb921d819a167d3362e4e8babc6a11b8ee85ca8272dba5c353beb7a1a5", 0x1d, 0xfffffffffffffffd}], 0x1000, &(0x7f0000000600)='bpf\x00') 21:58:28 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:28 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x88, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:28 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100025, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 21:58:28 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/stat\x00') fcntl$notify(r1, 0x402, 0x0) exit(0x0) getdents64(r1, &(0x7f0000000080)=""/57, 0x39) 21:58:28 executing program 4: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@usrquota='usrquota'}, {@discard_size={'discard', 0x3d, 0x6}}, {@nodiscard='nodiscard'}, {@integrity='integrity'}, {@umask={'umask', 0x3d, 0x1}}, {@errors_remount='errors=remount-ro'}], [{@uid_eq={'uid'}}]}) 21:58:28 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:28 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x100020, &(0x7f0000000080)) 21:58:29 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:29 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x5, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:29 executing program 4: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@usrquota='usrquota'}, {@discard_size={'discard', 0x3d, 0x6}}, {@nodiscard='nodiscard'}, {@integrity='integrity'}, {@umask={'umask', 0x3d, 0x1}}], [{@uid_eq={'uid'}}]}) 21:58:29 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x40, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000000)) 21:58:29 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x108011, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 21:58:29 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x4000000000000000, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:29 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:29 executing program 4: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@usrquota='usrquota'}, {@discard_size={'discard', 0x3d, 0x6}}, {@nodiscard='nodiscard'}, {@integrity='integrity'}], [{@uid_eq={'uid'}}]}) 21:58:29 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/stat\x00') fcntl$notify(r1, 0x402, 0x0) exit(0x0) getdents64(r1, &(0x7f0000000080)=""/57, 0x39) 21:58:29 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x4000, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:29 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:29 executing program 4: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@usrquota='usrquota'}, {@discard_size={'discard', 0x3d, 0x6}}, {@nodiscard='nodiscard'}], [{@uid_eq={'uid'}}]}) 21:58:29 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f00000007c0)=ANY=[@ANYRESOCT, @ANYPTR=&(0x7f0000000980)=ANY=[@ANYPTR64=&(0x7f0000000840)=ANY=[@ANYPTR64, @ANYRES32, @ANYRES16, @ANYBLOB="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"], @ANYRESOCT, @ANYRES16], @ANYPTR, @ANYPTR64=&(0x7f0000000080)=ANY=[@ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYPTR64, @ANYRES64, @ANYBLOB="0debbbfecec6e72f9e3e1cc230b9a2940e9035fbf4bcd4292cf431f05aae825b3126875f769e25e1ddae0322c2eb63d5e2aa7b1db7937593d8eaaf05ee5200aef18eddeee47d823c19cf23e6b1d485b799f11da02b6702b250d0a2f4ff09d7218b183b6c7daeae485b3f450a9b91eeda2dc4e5ba50c26f0443cc6e62dbc5d208c3c5ed20fb6a", @ANYRES64, @ANYRESDEC, @ANYRES32], @ANYRESOCT=0x0], @ANYPTR64=&(0x7f0000000480)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYBLOB="48044012d77c3e00182c345d332ae6afac509bd836509c96503f45db3b7bfa44883c2c4bf3c0f391fa017a8800728f0f424156762919bcf0a78792c9c37ba51ef78036de7fcc95baf744857319cf9921fd1a07bb6617c245640ddb1e4cee7b57d73fee3c8cce21783aad70b8bea43a82af74654b7bdb76de35bf7add99265e95b23f6629f6ffb6bce72776a26a363a2affd14e848a8e41f1a2b1bc6a87d45877c76a17a28e73e2e8779ecdcda76d132abc665a423935c9fd7a62f542a27e707d07c838109d817d8088b1a04b45cb7741ed64be86b8cccbd4a3af2068f8dd98", @ANYRESDEC, @ANYRES64, @ANYPTR], @ANYBLOB="3b30eec2aef1228c3aff444892cdbc90acc04170b261a4ad1106381c5c40fb26e66ad6ac9f6a60601045afe33430cc3d0318612f9ecc98e3b95ad1671ac9b3242d95f7e60cfd76c2f6cd669b99544ebf3129a641e709ec10cfcf834fbec1520d4807648492e8d222054aed5c8e398e4f98df5af4b6e739bb475b2f5a6df419d89486ac877b7c116a6fcfff28b68ac2993dbb5f8785f1907ea33672740a7aa23ce7a2c239f01aa8f4b4e5b3de407d5f90381fa787d428201e3bb6156278c1d0ac6662e6e548b1d0555ab1e2dd28807bc815a42d4b9938a8215811ff1df89cb97eb7735c21048c98fe34055956a6", @ANYRES32, @ANYPTR64=&(0x7f0000000280)=ANY=[@ANYPTR, @ANYRESDEC, @ANYRESDEC, @ANYRES16, @ANYRES16, @ANYPTR], @ANYRESDEC, @ANYBLOB="2a83ef709f80007b1e7dc785ac9de0775e95c6284c53c14d3d6d3bceac109e1be673adcd2b829ccd8ef45e2c8f7012489fa94f09cb907d9d091c406b5d952186095acaeed0c363e2f2384c0b3080e31edde49da7e3bc9ca8bd414fb39863e978b9b443cc9629e4f98189ed74ba6deb82c3c509a0078311f298f8c5abad39f4131081f110b7a95c5e30c29023b7054b9aaf4b6ecac64807a7bdf2621c920d6cff6347e03070518773817b6dd68403d2aa08b8c984ee30db8453795bc7859deff854dd3ebc88a00ce129d35a18d6f13486badeaffb0e9df39d3487de53b7179717ddd2f1d444f3c1f433bc163dce231f4dc7df", @ANYRES64], @ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESHEX, @ANYPTR64=&(0x7f00000002c0)=ANY=[@ANYPTR, @ANYPTR64, @ANYRES16, @ANYPTR64, @ANYRES16, @ANYRESHEX], @ANYRESDEC, @ANYPTR64=&(0x7f00000006c0)=ANY=[@ANYRESOCT, @ANYRES32, @ANYPTR64, @ANYPTR, @ANYPTR64, @ANYPTR64, @ANYRESDEC], @ANYRES64, @ANYRESHEX]]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)) 21:58:29 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x108019, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 21:58:30 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x300, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:30 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 672.701208] EXT4-fs: 11 callbacks suppressed [ 672.701220] EXT4-fs (sda1): re-mounted. Opts: 21:58:30 executing program 4: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@usrquota='usrquota'}, {@discard_size={'discard', 0x3d, 0x6}}], [{@uid_eq={'uid'}}]}) [ 672.782922] EXT4-fs (sda1): re-mounted. Opts: 21:58:30 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10000f, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 21:58:30 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000040)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)) semget(0x0, 0xf5da5126c81f4926, 0x80) 21:58:30 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 672.981702] EXT4-fs (sda1): re-mounted. Opts: [ 673.031841] EXT4-fs (sda1): re-mounted. Opts: 21:58:30 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/stat\x00') fcntl$notify(r1, 0x402, 0x0) exit(0x0) getdents64(r1, &(0x7f0000000080)=""/57, 0x39) 21:58:30 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x300000000000000, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:30 executing program 4: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@usrquota='usrquota'}], [{@uid_eq={'uid'}}]}) 21:58:30 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:30 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x108016, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 21:58:30 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)) r0 = gettid() sched_getattr(r0, &(0x7f0000000000), 0x30, 0x0) 21:58:30 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:30 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x300, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:30 executing program 4: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@usrquota='usrquota'}], [{@uid_eq={'uid'}}]}) 21:58:31 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:31 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)) creat(&(0x7f0000000040)='./file0\x00', 0x80) 21:58:31 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10c011, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 673.843475] EXT4-fs (sda1): re-mounted. Opts: [ 673.892414] EXT4-fs (sda1): re-mounted. Opts: 21:58:31 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/stat\x00') fcntl$notify(r1, 0x402, 0x400000000000031) exit(0x0) getdents64(0xffffffffffffffff, &(0x7f0000000080)=""/57, 0x39) 21:58:31 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x7802, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:31 executing program 4: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@usrquota='usrquota'}], [{@uid_eq={'uid'}}]}) 21:58:31 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:31 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x10000, 0x8, &(0x7f0000000780)=[{&(0x7f00000001c0)="58180f29a8b470f1e78dd75b4f52c414505760770d9d7633cf9c102f7a599388d57142f897ed10642b52409e717441ea2509de3b540c2ae99335fe1b72c5246662f46181ba47335d04ac292214e88197700964f7bed3a27749474fc7e6d63ca754022afc5fba55ade510acbb49681f2c20b018bc43a6e6834795875c1821982e937d3626d1eb17", 0x87, 0x9}, {&(0x7f0000000280)="30be5fb0a5e2f682d4e74692b443f52164eb12c90a884b707d1302942075498b5b84679f9e3a840f12a2fe4b89035b31a718982a2f5a4cf56669b76dadc5fedf2897fd32c18e7b97646a391e5f23e80b6dfd675e6748866c06dc7e72a97e49c7e4bbf6", 0x63, 0x1}, {&(0x7f0000000340)="af4d84cc2d2c9e4e91f8f562f1dce5a501f65faeb50b6f07d1ac67757d56e1672b11363d196d94bc86543b52dbe3d560703b600f4208b865f0607c398786738a0455170bfa55e6b8219a4ace6dccc300006a600bcc9634c4bcd658495b824ac7b3d70d072bbb4c5533220d60666e914cef81fcfeae35b79ad9cba806551a8849bec1f0fe452e438f5b10965a20e53373c571a431ee71178c2ccc574de9dd68503bd08bff2362008f1a9ea6f4963df097e3941dc4faff866ec031ea07", 0xbc, 0x1ff}, {&(0x7f0000000400)="847785e3453349126b630af5d28558e4722d0c72eb0a472eec5c56222126d226991f8c75ff0af6bea24581723fcbec296460fcf06b4dcfed71388f8ad300c47885f51ef9f3a9307797cc0995cc2d738ca4e446871d311cd8d52ff3830c067b56ffadbde1027364a8fd87ab2cf4303fcf66fce7fe97026e4e0b4a8be8b6c5657ab22d38bc6145511ee6395ee796b829e287ba3b4d35f4276783ff177fd582dbcb151e8ddcccff00fecb7431548b325d5aefcf9dac939a1bfddca260e8ffb1", 0xbe, 0x7}, {&(0x7f00000004c0)="c33ff4657eb49bfe5f627286186998394bea664acec6a9c38d17f613", 0x1c, 0x7}, {&(0x7f0000000500)="1c3a6dfd65f29fe7a4fa70987e9664c738b43adf335b049a36a7da71ea2e49c1aa0630bb43a6ccd9ddb19735fb0277f0f9eeab9f7d2f9e797ca0c08aa911db33467f85390f48f53657587f3d1be20079938a8b142783c00d8e4f73c5faf399406a853a24aa484a4fd40a5dbe972d2e3f893acb541fcf88a533bd7c71b6787e113f3ee66130d2045a7f97aaf0a290effb0c67c0ca8b", 0x95, 0x48}, {&(0x7f00000005c0)="89db55e7c8fd91340e2c5f6e240c899c34e216a3e8ab6b63e55681d64c334398e6044c29010edf8337e63b1cef3944417d56df33a0438bc94ccaeeac56f1e7e676fed33d129c480ff47f10a7aeec87554ac668f08209b30959b7593e3a03e208b9b62a4bcf3109ce59ad2bd79550d9d8aa94dfe4ee440b6d1e5a34fa2d93a6dffcd25884a3bcdb31093951d081a51af184634af4c5f1ac42ebfb1c6c0da8cb56225d236db41d44ae1d0f9109cd8de1f6fab89b96ba55c40e6c5736e6731de30f783d692b6e1f32eb7dc093fd0fa5af0148f28b151c25a81a06cfc659eda3f2", 0xdf, 0x6}, {&(0x7f00000006c0)="da77b4fbd24030687bfda66a6e9561088703f99e7a0b0daafa994f92408eda009577417dab3953cf9336ccfb13e5729bfe55ad93227d6717b5b914ccaf1f39b5d9dfef8a3ac85d69655f70bc3340ad0e145ad93793f9fef2ada8ea7bdd8b5f9473ca98b2c7d6abedf4563481485f25c861ae8aa7ac49630f32d97431ffc6d719c2ddece171948c6ff80a703db642cba4b3e4996ecbb8b36150dad6750810", 0x9e, 0x6}], 0x1000, &(0x7f00000008c0)={[{@fat=@showexec='showexec'}, {@nodots='nodots'}, {@dots='dots'}], [{@uid_lt={'uid<', r0}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)) 21:58:31 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10003b, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 21:58:31 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x400000000000000, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:31 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:31 executing program 4: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@usrquota='usrquota'}, {@discard_size={'discard'}}], [{@uid_eq={'uid'}}]}) [ 674.631856] EXT4-fs (sda1): re-mounted. Opts: 21:58:31 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x108014, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 21:58:31 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:31 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x3f00000000000000, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:32 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10400f, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 21:58:32 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:32 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000040)='./file0\x00', 0x0, 0x24d, &(0x7f0000000700), 0x100020, &(0x7f0000000300)) 21:58:32 executing program 4: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}], [{@uid_eq={'uid'}}]}) 21:58:32 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x88000000, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:32 executing program 3: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:32 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 675.532818] EXT4-fs (sda1): re-mounted. Opts: 21:58:32 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x600, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:32 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x81, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x1, 0x0) select(0x40, &(0x7f00000000c0)={0x8, 0x2, 0x5, 0xb60, 0xe, 0x5, 0xd816, 0x7}, &(0x7f0000000100)={0x314018d, 0x3, 0x937f, 0x2, 0x7fff, 0xfffffffeffffffff, 0xff, 0x4}, &(0x7f0000000140)={0x4, 0xb83, 0x2, 0x6e, 0x8, 0x8, 0x8000, 0xe47b}, &(0x7f00000001c0)={0x0, 0x2710}) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') read(r2, &(0x7f0000000380)=""/245, 0xfffffffffffffdff) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r3, 0x810c5701, &(0x7f00000004c0)) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40046602, &(0x7f0000000640)=0x84000) syz_open_dev$dri(&(0x7f0000000480)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r3, 0x4048ae9b, &(0x7f0000000040)={0x0, 0x0, [0x9, 0x8, 0x9, 0xffffffffffff14af, 0x10000, 0x8, 0xff, 0xffff]}) linkat(r3, &(0x7f0000000680)='./file0\x00', r3, &(0x7f00000006c0)='./file0\x00', 0x1400) fcntl$getownex(r2, 0x10, &(0x7f0000000200)) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000000)={0x6, @multicast1, 0x0, 0x6000600, 'dh\x00', 0x20, 0x80000000, 0x17}, 0x2c) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x40, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f0000000740)={'broute\x00', 0x0, 0x0, 0x0, [], 0x10000000000000cd, &(0x7f0000000700)=[{}]}, 0xa0) getsockopt$inet_mreqn(r2, 0x0, 0x24, &(0x7f00000002c0)={@multicast1, @local}, &(0x7f0000000840)=0xffc0) syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/net\x00') openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.net/syz0\x00', 0x200002, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) perf_event_open(&(0x7f0000001000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000005000), 0x2}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000080)=0x8001) signalfd4(r5, &(0x7f0000000800), 0x8, 0x80000) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f000000d000), &(0x7f0000001000)=0xfea6) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0xc1105517, &(0x7f0000001000)) close(r0) recvmmsg(0xffffffffffffffff, &(0x7f0000006340)=[{{&(0x7f0000002840)=@l2, 0x80, &(0x7f0000002dc0)=[{&(0x7f00000028c0)=""/220, 0xdc}, {&(0x7f00000029c0)=""/214, 0xd6}], 0x2, &(0x7f0000002d40)=""/47, 0x2f}, 0x20000000000000}], 0x1, 0xffffffffffffffff, &(0x7f0000006400)={0x77359400}) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) 21:58:32 executing program 4: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@discard_size={'discard'}}], [{@uid_eq={'uid'}}]}) [ 675.610507] EXT4-fs (sda1): re-mounted. Opts: 21:58:32 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:32 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100007, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 21:58:33 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x20000, 0x22) getpeername$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)) 21:58:33 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x2, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:33 executing program 4: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@discard_size={'discard'}}], [{@uid_eq={'uid'}}]}) 21:58:33 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:33 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x81, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x1, 0x0) select(0x40, &(0x7f00000000c0)={0x8, 0x2, 0x5, 0xb60, 0xe, 0x5, 0xd816, 0x7}, &(0x7f0000000100)={0x314018d, 0x3, 0x937f, 0x2, 0x7fff, 0xfffffffeffffffff, 0xff, 0x4}, &(0x7f0000000140)={0x4, 0xb83, 0x2, 0x6e, 0x8, 0x8, 0x8000, 0xe47b}, &(0x7f00000001c0)={0x0, 0x2710}) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') read(r2, &(0x7f0000000380)=""/245, 0xfffffffffffffdff) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r3, 0x810c5701, &(0x7f00000004c0)) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40046602, &(0x7f0000000640)=0x84000) syz_open_dev$dri(&(0x7f0000000480)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r3, 0x4048ae9b, &(0x7f0000000040)={0x0, 0x0, [0x9, 0x8, 0x9, 0xffffffffffff14af, 0x10000, 0x8, 0xff, 0xffff]}) linkat(r3, &(0x7f0000000680)='./file0\x00', r3, &(0x7f00000006c0)='./file0\x00', 0x1400) fcntl$getownex(r2, 0x10, &(0x7f0000000200)) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000000)={0x6, @multicast1, 0x0, 0x6000600, 'dh\x00', 0x20, 0x80000000, 0x17}, 0x2c) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x40, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f0000000740)={'broute\x00', 0x0, 0x0, 0x0, [], 0x10000000000000cd, &(0x7f0000000700)=[{}]}, 0xa0) getsockopt$inet_mreqn(r2, 0x0, 0x24, &(0x7f00000002c0)={@multicast1, @local}, &(0x7f0000000840)=0xffc0) syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/net\x00') openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.net/syz0\x00', 0x200002, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) perf_event_open(&(0x7f0000001000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000005000), 0x2}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000080)=0x8001) signalfd4(r5, &(0x7f0000000800), 0x8, 0x80000) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f000000d000), &(0x7f0000001000)=0xfea6) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0xc1105517, &(0x7f0000001000)) close(r0) recvmmsg(0xffffffffffffffff, &(0x7f0000006340)=[{{&(0x7f0000002840)=@l2, 0x80, &(0x7f0000002dc0)=[{&(0x7f00000028c0)=""/220, 0xdc}, {&(0x7f00000029c0)=""/214, 0xd6}], 0x2, &(0x7f0000002d40)=""/47, 0x2f}, 0x20000000000000}], 0x1, 0xffffffffffffffff, &(0x7f0000006400)={0x77359400}) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) 21:58:33 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000040)) 21:58:33 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:33 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10002f, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 21:58:33 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x600000000000000, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:33 executing program 4: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@discard_size={'discard'}}], [{@uid_eq={'uid'}}]}) [ 676.054459] EXT4-fs (sda1): re-mounted. Opts: 21:58:33 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:33 executing program 4: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:58:33 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x700000000000000, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:33 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x6552, 0x88200) write$P9_RREMOVE(r0, &(0x7f0000000140)={0x7, 0x7b, 0x1}, 0x7) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x19ee, 0x8fdd}, 0xc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x2001001, &(0x7f00000001c0)=ANY=[@ANYBLOB="8fe9a569d13a884f32aecd78f1309c92cad9795630ece9f3cf70517c3950f7f948288cfb12e21ccba201845584d0cc1efe4ec32d7636804e0a1ce349a5829d803bff45e4f99d077a74598562852348b63914e1e370b0fa1aa1dde119b558", @ANYRES32]) syz_mount_image$ext4(&(0x7f0000000280)="00f83f0080", &(0x7f0000000240)='./file1\x00', 0x0, 0xaaaaaaaaaaaaba3, &(0x7f0000000700), 0x100020, &(0x7f0000000440)={[{@usrquota='usrquota'}, {@block_validity='block_validity'}, {@minixdf='minixdf'}, {@i_version='i_version'}, {@lazytime='lazytime'}, {@resgid={'resgid', 0x3d, 0xffffffffffffffff}}, {@journal_ioprio={'journal_ioprio'}}, {@max_batch_time={'max_batch_time', 0x3d, 0x400}}]}) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000180)=0x7, 0x4) 21:58:33 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:33 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100016, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 21:58:33 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x81, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x1, 0x0) select(0x40, &(0x7f00000000c0)={0x8, 0x2, 0x5, 0xb60, 0xe, 0x5, 0xd816, 0x7}, &(0x7f0000000100)={0x314018d, 0x3, 0x937f, 0x2, 0x7fff, 0xfffffffeffffffff, 0xff, 0x4}, &(0x7f0000000140)={0x4, 0xb83, 0x2, 0x6e, 0x8, 0x8, 0x8000, 0xe47b}, &(0x7f00000001c0)={0x0, 0x2710}) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') read(r2, &(0x7f0000000380)=""/245, 0xfffffffffffffdff) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r3, 0x810c5701, &(0x7f00000004c0)) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40046602, &(0x7f0000000640)=0x84000) syz_open_dev$dri(&(0x7f0000000480)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r3, 0x4048ae9b, &(0x7f0000000040)={0x0, 0x0, [0x9, 0x8, 0x9, 0xffffffffffff14af, 0x10000, 0x8, 0xff, 0xffff]}) linkat(r3, &(0x7f0000000680)='./file0\x00', r3, &(0x7f00000006c0)='./file0\x00', 0x1400) fcntl$getownex(r2, 0x10, &(0x7f0000000200)) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000000)={0x6, @multicast1, 0x0, 0x6000600, 'dh\x00', 0x20, 0x80000000, 0x17}, 0x2c) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x40, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f0000000740)={'broute\x00', 0x0, 0x0, 0x0, [], 0x10000000000000cd, &(0x7f0000000700)=[{}]}, 0xa0) getsockopt$inet_mreqn(r2, 0x0, 0x24, &(0x7f00000002c0)={@multicast1, @local}, &(0x7f0000000840)=0xffc0) syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/net\x00') openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.net/syz0\x00', 0x200002, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) perf_event_open(&(0x7f0000001000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000005000), 0x2}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000080)=0x8001) signalfd4(r5, &(0x7f0000000800), 0x8, 0x80000) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f000000d000), &(0x7f0000001000)=0xfea6) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0xc1105517, &(0x7f0000001000)) close(r0) recvmmsg(0xffffffffffffffff, &(0x7f0000006340)=[{{&(0x7f0000002840)=@l2, 0x80, &(0x7f0000002dc0)=[{&(0x7f00000028c0)=""/220, 0xdc}, {&(0x7f00000029c0)=""/214, 0xd6}], 0x2, &(0x7f0000002d40)=""/47, 0x2f}, 0x20000000000000}], 0x1, 0xffffffffffffffff, &(0x7f0000006400)={0x77359400}) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) 21:58:33 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x7802000000000000, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:33 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:33 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x40000000, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:33 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10c00f, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 21:58:33 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:33 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)=ANY=[@ANYBLOB]) 21:58:33 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10800f, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 21:58:33 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x6000000, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:33 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100014, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 21:58:33 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:34 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x1000000, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:34 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x81, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x1, 0x0) select(0x40, &(0x7f00000000c0)={0x8, 0x2, 0x5, 0xb60, 0xe, 0x5, 0xd816, 0x7}, &(0x7f0000000100)={0x314018d, 0x3, 0x937f, 0x2, 0x7fff, 0xfffffffeffffffff, 0xff, 0x4}, &(0x7f0000000140)={0x4, 0xb83, 0x2, 0x6e, 0x8, 0x8, 0x8000, 0xe47b}, &(0x7f00000001c0)={0x0, 0x2710}) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') read(r2, &(0x7f0000000380)=""/245, 0xfffffffffffffdff) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r3, 0x810c5701, &(0x7f00000004c0)) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40046602, &(0x7f0000000640)=0x84000) syz_open_dev$dri(&(0x7f0000000480)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r3, 0x4048ae9b, &(0x7f0000000040)={0x0, 0x0, [0x9, 0x8, 0x9, 0xffffffffffff14af, 0x10000, 0x8, 0xff, 0xffff]}) linkat(r3, &(0x7f0000000680)='./file0\x00', r3, &(0x7f00000006c0)='./file0\x00', 0x1400) fcntl$getownex(r2, 0x10, &(0x7f0000000200)) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000000)={0x6, @multicast1, 0x0, 0x6000600, 'dh\x00', 0x20, 0x80000000, 0x17}, 0x2c) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x40, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f0000000740)={'broute\x00', 0x0, 0x0, 0x0, [], 0x10000000000000cd, &(0x7f0000000700)=[{}]}, 0xa0) getsockopt$inet_mreqn(r2, 0x0, 0x24, &(0x7f00000002c0)={@multicast1, @local}, &(0x7f0000000840)=0xffc0) syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/net\x00') openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.net/syz0\x00', 0x200002, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) perf_event_open(&(0x7f0000001000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000005000), 0x2}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000080)=0x8001) signalfd4(r5, &(0x7f0000000800), 0x8, 0x80000) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f000000d000), &(0x7f0000001000)=0xfea6) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0xc1105517, &(0x7f0000001000)) close(r0) recvmmsg(0xffffffffffffffff, &(0x7f0000006340)=[{{&(0x7f0000002840)=@l2, 0x80, &(0x7f0000002dc0)=[{&(0x7f00000028c0)=""/220, 0xdc}, {&(0x7f00000029c0)=""/214, 0xd6}], 0x2, &(0x7f0000002d40)=""/47, 0x2f}, 0x20000000000000}], 0x1, 0xffffffffffffffff, &(0x7f0000006400)={0x77359400}) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) 21:58:34 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:34 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x6, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:34 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)) setxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f00000001c0)='./file0\x00', 0x8, 0x2) 21:58:34 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x1100001, &(0x7f0000000040)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)) lstat(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2040, 0x0) mount$fuse(0x0, &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='fuse\x00', 0x8, &(0x7f0000000340)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x400}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x400}}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}], [{@context={'context', 0x3d, 'user_u'}}]}}) r3 = getegid() lchown(&(0x7f0000000040)='./file0\x00', r0, r3) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000480)={'team0\x00', 0x0}) connect(r2, &(0x7f00000004c0)=@hci={0x1f, r4, 0x3}, 0x80) 21:58:34 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10801d, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 21:58:34 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:34 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x278, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:34 executing program 3: close(0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/stat\x00') fcntl$notify(r0, 0x402, 0x400000000000031) exit(0x0) getdents64(r0, &(0x7f0000000080)=""/57, 0x39) 21:58:34 executing program 4: close(0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/stat\x00') fcntl$notify(r0, 0x402, 0x400000000000031) exit(0x0) getdents64(r0, &(0x7f0000000080)=""/57, 0x39) 21:58:34 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:34 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x664043, 0x0) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000080)=0xb) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)) 21:58:34 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x11, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:34 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:34 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x108003, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 21:58:34 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x500000000000000, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:34 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:34 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:34 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0xffffffff00000000, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:34 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x800, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6f, &(0x7f0000000280), &(0x7f00000002c0)=0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x10000, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000080)) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000200)={0x6, &(0x7f00000001c0)=[{0x2, 0x5, 0x9, 0xfffffffffffffbb7}, {0x1, 0x5}, {0x0, 0xe0, 0x7f, 0x6386}, {0x0, 0x8, 0xfe, 0x3}, {0x7fffffff, 0x8, 0x10001, 0x7f}, {0x0, 0x3, 0x0, 0xffff}]}, 0x10) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)) mlock(&(0x7f0000ffd000/0x2000)=nil, 0x2000) 21:58:35 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[], [], 0x6c000000}) 21:58:35 executing program 4: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:35 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:35 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x2000000000000, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:35 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x108008, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 21:58:35 executing program 1: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f00000002c0)={0x3, 0x1, &(0x7f0000000340)=""/4096, &(0x7f0000000080)=""/45, &(0x7f00000001c0)=""/207, 0x6586ab7cbf3f6007}) mkdir(&(0x7f0000000040)='./file0\x00', 0x4) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)) [ 678.102928] EXT4-fs: 7 callbacks suppressed [ 678.102939] EXT4-fs (sda1): re-mounted. Opts: 21:58:35 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[], [], 0x200000000000000}) 21:58:35 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:35 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/stat\x00') fcntl$notify(r1, 0x402, 0x400000000000031) exit(0x0) getdents64(r1, &(0x7f0000000080)=""/57, 0x39) 21:58:35 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x7000000, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:35 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:35 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x104017, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 21:58:35 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f0000000080)={0x20, 0xffffffffffffffda, 0x6, {0x0, 0x4}}, 0x20) [ 678.346127] EXT4-fs (sda1): re-mounted. Opts: 21:58:35 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:35 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[], [], 0x200000000000000}) 21:58:35 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x3f000000, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 678.509355] EXT4-fs (sda1): re-mounted. Opts: 21:58:35 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:35 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x4000000, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 678.575669] EXT4-fs (sda1): re-mounted. Opts: [ 678.595691] EXT4-fs (sda1): re-mounted. Opts: 21:58:35 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:35 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10c00d, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 21:58:36 executing program 4: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000000000000300", 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:36 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[], [], 0x10}) 21:58:36 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x2) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000840)={{{@in6, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f0000000940)=0xe8) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0xa, &(0x7f0000000740)=[{&(0x7f00000001c0)="ecec28fb8026c788e322b651f6b7a1dba653dd2e7b8c3feac081feffec7b4b3a6699c6c2", 0x24, 0x1}, {&(0x7f0000000200)="983a1e26d2c6b3915ea7674258da42d14f46a26409da220d1b10f8dc1aa84d33798b621941d83c7b18c9c2d79bfbad2556ff8bb2a3bc08cbfcbf1c98072b2e7abd1e082ca0d05db36d3c8f72ff6e385b0cfff3f443243d915f7f6ef280c6d38336eabece879b65026e2709eb4d8156d75e64bff62059bfd3af5ad669c6cbfff72b3b8e9b3745ea2399659dc9a4d21866a5c15c591d983c3ffb427966a3df32c8dd2f83883f1d540fc57f03ad75978579fc349794d87723c532b271db68f6bb283988dc19c57f01e2172333ce24dfdb083389081690a02fe496a10d718ccbe1d98fb25ce0ca9a67077cb642bc3fe6bda569a19d8de7", 0xf5, 0xffff}, {&(0x7f0000000340)="375dbce3029bed17a99332462d5e586725fa1e1cd073fbced7afc6508725f670ad44eebfd6662b05797d991de50fa1aba0c3039fa419760c4a4c3043e9db03020720dbd484c8883a641bcb157c3997", 0x4f, 0x6}, {&(0x7f00000003c0)="a169680f737329f358e535fbc407ea2146db308006985183bff66beeaee5136bd3fe7bb1b7bad730aa70c13d953443cdaedf367da4aaed50605670b223ccb9311864358a82d44bbc31c781c0f621e5cb8327aadc68919f17584b5dec22cfcd3bb36f5b9794f22d9aa15eec282a8859400c12ad", 0x73, 0x6}, {&(0x7f0000000440)="1ef94f57d7165c28e5fbd5d22abac31e522e2f777f732457012f60e87d889f5285b18f8e43d9934d15d7c921ee12b3dc6df7b0980b5cccd0ca6e3da53467e2e47f41557ff2845f6749adb34eeb4219a70f7760f7efefb020785493b43e8202f08c8a1712acc38e27869f45220108c5f2a15864de46f8f7a588d78b1a036ada03ee826c153a1e8e4b2a6a3cb2ece6d3393beb94667dbc3954fac7b7dbb581ce9bb78542676cf4fb68e94c90fe756c2b0c29e57a11ff54", 0xb6, 0x1}, {&(0x7f0000000500)="732c5796173c21e6e789b7aa333dc042f57c8fd02ed02bf959027618a2c611474a2a6a228ec0e91628f0c0b80a5bd78320de2bcf93d6e19e55d71872c9bf9ddd7b1bf7364a8ce97f7999cbe65c92032a92abcdad4935ddf30e5c474c7e60739ccf8cdc85f8f08bd09d0c6096fc72da4e2167d21b63e1121782f7e75ddb57ccce64aa39566a2b482ce4d3f096fd21af819c", 0x91, 0x10001}, {&(0x7f00000005c0)="614960d0", 0x4, 0x6f1bb67}, {&(0x7f0000000600)="8fdf040ef6a126ca4ee4ca1c3c74f2775df62f025688de40ee83980bf9016c2db5bc838ef4b4a6fcb91260ab666fb0283637de5cb06a11454ef9335a0864da788a1004c1183e00acf27be0a54519ce98f975e68369760d1617cccf2d841f2b76618e5caad664559476337871ebc1e96f21eed37549bafada3bcfe81885ba9f9a", 0x80, 0x6}, {&(0x7f0000000680)="a0306066e7", 0x5}, {&(0x7f00000006c0)="bfa2ac5b4316491a7e79ea4c725352ca298497cd88ecdc35cc7fd0b72e58d0488b0780538ae91c80d115ee0e0c7391d1ce52ac30cd970d9c7c1ad55754c4b63cff", 0x41, 0x6}], 0x149f773dc5711f44, &(0x7f0000000980)={[{@file_umask={'file_umask', 0x3d, 0x6}}, {@creator={'creator', 0x3d, "6180f385"}}, {@creator={'creator', 0x3d, "c3beed8f"}}, {@session={'session', 0x3d, 0x8}}, {@uid={'uid', 0x3d, r0}}], [{@pcr={'pcr', 0x3d, 0x21}}, {@fsname={'fsname', 0x3d, 'bpf\x00'}}]}) 21:58:36 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x3000000, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:36 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:36 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100019, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 21:58:36 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:36 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x500, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 679.265230] EXT4-fs (sda1): Unrecognized mount option "" or missing value [ 679.346568] EXT4-fs (sda1): re-mounted. Opts: 21:58:36 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x104001, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 679.412071] EXT4-fs (sda1): re-mounted. Opts: 21:58:36 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x1000000000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)) 21:58:36 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:36 executing program 1: r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x7d29, 0x80) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@local, @in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f00000002c0)=0xe8) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) ioctl$PPPOEIOCDFWD(r0, 0xb101, 0x0) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)) 21:58:36 executing program 4: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000000000000200", 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:36 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x88, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:36 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 679.697711] EXT4-fs (sda1): re-mounted. Opts: 21:58:37 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x100000000000000, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:37 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x104011, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 21:58:37 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0xebffffff, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 21:58:37 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000000000000000000200", 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 679.761943] EXT4-fs (sda1): re-mounted. Opts: 21:58:37 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:37 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x200000000000000, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:37 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000008800", 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:37 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"]) 21:58:37 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:37 executing program 4: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000feffff0700", 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:37 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x104013, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 21:58:37 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x4000, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:37 executing program 3: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:37 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:37 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f00000015c0)=[{&(0x7f0000000500)="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", 0x1d7, 0x7a}]) 21:58:37 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x3f00, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:37 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) ppoll(&(0x7f0000000280)=[{r0, 0x8482}, {r1, 0x180}], 0x2, &(0x7f0000000300)={r2, r3+10000000}, &(0x7f0000000340)={0x40}, 0x8) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f00000001c0)=ANY=[@ANYBLOB="9ea13107718c0268573c63453255491aecbad2806b455778ad8da0d75c34ec5f9dc661bf21a157f44d69e43b1a7369569dd2dcbb470f22360efbba69c29d623a5a3087e9c1e0e1a0cf6d1c9431ec025757766b25ba8df498ed121dab2c636cdc2df3bb2c1c09e0b251573b3aff0417f7be4802be32baf2e2cef813b119a9da43437a5bf1da934e74790209cf64633de37dc046c2ba302dac21e8a6b04e16cacad1eb682394b1f54c0b"]) 21:58:37 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:37 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x104003, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 21:58:37 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000200", 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 680.329793] Dev loop4: unable to read RDB block 1 [ 680.334722] loop4: unable to read partition table 21:58:37 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x1100, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 680.379032] loop4: partition table beyond EOD, truncated [ 680.384771] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 21:58:37 executing program 3: syz_read_part_table(0x6800000000000000, 0x1, &(0x7f00000015c0)=[{&(0x7f0000000500)="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", 0x1d5}]) 21:58:37 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:37 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f00000015c0)=[{&(0x7f0000000500)="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", 0x1d7, 0x7a}]) 21:58:37 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x3, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:37 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:37 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10400b, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 21:58:37 executing program 3: ustat(0xf, &(0x7f0000000080)={0x0}) [ 680.631036] Dev loop4: unable to read RDB block 1 [ 680.641837] loop4: unable to read partition table [ 680.649684] loop4: partition table beyond EOD, truncated [ 680.661200] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 21:58:38 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x100) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000900)='/dev/rfkill\x00', 0x9c400, 0x0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) renameat2(r0, &(0x7f0000000940)='./file0\x00', r1, &(0x7f0000000980)='./file0\x00', 0x1) r2 = open(&(0x7f0000000800)='./file0\x00', 0x208241, 0x82) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r2, 0xc0845657, &(0x7f0000000840)={0x0, @reserved}) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2000fff, &(0x7f0000000200)=ANY=[]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@local, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000002c0)=0xe8) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x9e6, 0x4, &(0x7f0000000540)=[{&(0x7f00000001c0)="540eb3c77762865af8d3b42eb1ea8d22a1eed0ea045892ae69a6db54601dd51cd6b796b7e709f65f6167442ec702bf3fb0ec953d29e07158b42da1c9acafcb65be1c5e2e2a3f0dbf900d1d24ba392218bd8c80066ed7f71e4a8c8ae37c46678eb158e3e60ec326bc02fb424f65f5", 0x6e, 0xebc}, {&(0x7f0000000240)="fb47ad995994e23d91787d380dc6da89c957cf6147321ba4b5b398ff8640b9b7764aa41d52f58503eda8d88332184eb116aac592c04b517b7d977ff086d7cd4a9afc8b99ee34f5d9ae9689f27697", 0x4e, 0x1280000000}, {&(0x7f0000000340)="fe91b1562afe29cf9243dbffd1da7ff91d60ab4e825f8b48f7c0e78c5d08919cce080dcd3ef5fe5fad71c5a98f0dc4f8fd3405396119a89b1a9d2b6064826d6234418b9c51923fd34514fa5262898ff571f96d930fd39ac6b32ec18e87d973bd07bf0844ea724d9bc4ac7684111cabf9836d008281581fe65504fefd980e682b1fdc7fcf82335b28754938972390c0eb9947c816900d051a05f64d81df80c1bf3841a5c7f064f5291e8f733c684d52eb851ae797b9988c6119f3dafcc5710f314ca49942ee782ce10591ce665f29daecb872caba782287af89fbbdc72c39c97d4899b216818cc7b4207a29f6fd2ecf3cc35a3a21b384ef", 0xf7, 0x300000000000000}, {&(0x7f0000000440)="17ba1da46ce3c808b0611c9b24c403e93373d9f834bf925523386940661e115a1cd8958f6287ad163e97fd51a0405da4e1eca687285686d675ef3864e17a8517727cffe343ec9e70d8b01655a24b65abdc3c55d92c771a0875c9f60d8b8be30f47447be32bd981e046c7277a04967bbaad3b658096d94876963f0b2f299b662c43ce2dfc4ba5b612180ce75412076376dfe653e256dd2c2edda3fa22254632aebb844c20a83f77abf659566a57fb577856f029aebd4fc55d6d4d5776fba7fe3f81c344c808", 0xc5, 0xfffffffffffffffe}], 0x10, &(0x7f00000006c0)={[{@block_validity='block_validity'}, {@nomblk_io_submit='nomblk_io_submit'}], [{@context={'context', 0x3d, 'staff_u'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'bpf\x00'}}, {@uid_gt={'uid>', r3}}, {@permit_directio='permit_directio'}]}) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r4, 0x84, 0x7, &(0x7f0000000780), &(0x7f00000007c0)=0x4) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)) 21:58:38 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:38 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x4000000000000000, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:38 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='\x00\x00\x00\x00x', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 21:58:38 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f00000015c0)=[{&(0x7f0000000500)="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", 0x1d7, 0x7a}]) 21:58:38 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10800e, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 21:58:38 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:38 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x700, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 681.419715] Dev loop4: unable to read RDB block 1 [ 681.429364] loop4: unable to read partition table [ 681.451422] loop4: partition table beyond EOD, truncated 21:58:38 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 681.482087] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 21:58:38 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10800d, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 21:58:38 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='\x00\x00\x00\x003', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 681.529214] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 21:58:38 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 681.652971] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 21:58:39 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)) r0 = accept$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x7, 0x27c35419, 0x7ff, 0x1, 0x3, 0x7, 0xb31, 0x7, 0x40, 0x2e0, 0x9, 0x5c39e519, 0x38, 0x1, 0x3f, 0x5, 0x80000000}, [{0x60000000, 0xffff, 0xffff, 0x6, 0x2, 0xfffffffffffffff8, 0x6, 0x11}], "db3266ad536aac476c445fcfde5264d8d34d64992abbd7cbe0a228dde4dd92b55cabd7b3b2a678087891b432294ced723b3a9cc0d8b608b6988fe85554e6b68b3ba5c9bed206c75576735981505ff3260245a531303cbf976b208040d6be0a5f7a69f4a0def21b42dcc5c775d71686c73f6aab6ae5b5902fe7fa65a2d90581f685f0cd60109d7ff5c5e03a1335694331fafc6aaee421c0ca", [[], [], [], [], [], [], []]}, 0x810) 21:58:39 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x78020000, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:39 executing program 4: syz_read_part_table(0x0, 0x0, &(0x7f00000015c0)) 21:58:39 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:39 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000008800", 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:39 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10c00e, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 21:58:39 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x11000000, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:39 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:39 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:39 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x2000000, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:39 executing program 4: syz_read_part_table(0x0, 0x0, &(0x7f00000015c0)) 21:58:39 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000008800", 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:39 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x140000, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)) 21:58:39 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:39 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)) r0 = accept$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x7, 0x27c35419, 0x7ff, 0x1, 0x3, 0x7, 0xb31, 0x7, 0x40, 0x2e0, 0x9, 0x5c39e519, 0x38, 0x1, 0x3f, 0x5, 0x80000000}, [{0x60000000, 0xffff, 0xffff, 0x6, 0x2, 0xfffffffffffffff8, 0x6, 0x11}], "db3266ad536aac476c445fcfde5264d8d34d64992abbd7cbe0a228dde4dd92b55cabd7b3b2a678087891b432294ced723b3a9cc0d8b608b6988fe85554e6b68b3ba5c9bed206c75576735981505ff3260245a531303cbf976b208040d6be0a5f7a69f4a0def21b42dcc5c775d71686c73f6aab6ae5b5902fe7fa65a2d90581f685f0cd60109d7ff5c5e03a1335694331fafc6aaee421c0ca", [[], [], [], [], [], [], []]}, 0x810) 21:58:39 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0xfeffff07, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:39 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10401a, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 21:58:39 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:39 executing program 4: syz_read_part_table(0x0, 0x0, &(0x7f00000015c0)) 21:58:39 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:39 executing program 1: clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in6=@mcast1, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000340)="e5a8e798a4eb7fcdbec38e1a863edea56dd2f6cc386b3039999edd5becd99f67d3678d1d06623cea760402cd8c6e9234757b214ffa56eec47a4787b583a7094822a342545f265e6addb2b150e7985d332d57689385aca6e8551bf12c72a994", 0x5f, 0x3}], 0x1, &(0x7f0000000600)={[{@test_dummy_encryption='test_dummy_encryption'}, {@noauto_da_alloc='noauto_da_alloc'}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}, {@sysvgroups='sysvgroups'}, {@block_validity='block_validity'}, {@nouid32='nouid32'}, {@grpjquota='grpjquota='}, {@noblock_validity='noblock_validity'}, {@nombcache='nombcache'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@dont_hash='dont_hash'}, {@pcr={'pcr', 0x3d, 0x3b}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x34, 0x7f, 0x34, 0x0, 0x65, 0x67, 0x77], 0x2d, [0x38, 0x37, 0x73, 0x61], 0x2d, [0x66, 0x33, 0x73, 0x33], 0x2d, [0x37, 0x37, 0x7b, 0x39], 0x2d, [0x33, 0x76, 0x36, 0x32, 0x77, 0x62, 0x77, 0x79]}}}, {@uid_gt={'uid>', r2}}]}) utimes(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={{0x77359400}, {r0, r1/1000+30000}}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) lsetxattr$trusted_overlay_redirect(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x3) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f00000003c0)=ANY=[@ANYBLOB="00caf71f04fa567eb02663a8cb60f24652db68d1148cb5b4e7a090d4faaae0a8ee6b83e092231a6ceb2007677bc9459ff610ceb858b3b6e36365e5d6ddfeae01815ff822f109ed9f0aa74ed62d50b9367282b04984fb5cf3c9ca68bf2eb225b9c9bf37c34e6f9ab329837c850b36ac518efb60c3909da189562889ccb28741d20b567c49a8d12f38b47547"]) 21:58:39 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x20000, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:39 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='\x00\x00\x00\x00N', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 21:58:39 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f00000015c0)=[{&(0x7f0000000500), 0x0, 0x7a}]) 21:58:39 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 682.414224] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 21:58:39 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'\nebug_want_extra_isize'}}]}) 21:58:39 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x7, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:39 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:39 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f00000015c0)=[{&(0x7f0000000500), 0x0, 0x7a}]) 21:58:39 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x7fffffe, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:39 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 682.577268] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 21:58:39 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000ffffffff00", 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:39 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x100020, &(0x7f0000000040)=ANY=[@ANYBLOB="62f93c4d95beba3ec7"]) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x800, 0x68) r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f00000001c0)=""/227) 21:58:39 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:39 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f00000015c0)=[{&(0x7f0000000500), 0x0, 0x7a}]) 21:58:40 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x8800000000000000, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:40 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:40 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'%ebug_want_extra_isize'}}]}) 21:58:40 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:40 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:40 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f00000015c0)=[{&(0x7f0000000500)="f10457d357850ba96b3177c5432bf4d57c0df1e6e18ce27b33d45d2e44ea456be44eda49bb10e571862513b61f102eed99409fc67556483b021260a6f33dc13da1d50ddc83aa3a84a6f07efb3392e1a070fc93147c678e2c4902fd60a9f8022b1cd2f6cce4395660373a5d44cfb97743fa1936d10e0eca652e427449e026f4fc95277e2947ff7c23e8a9600b8d1f68338c57cab04985c591388803e6596d8bae0bd479bae6846d61e8fefe2551fc2e9859203159a172db93cf6c8c8f5905d602d33c5960cd9ee8105d2fa64f2dff6e70f20c95ec33e98d0588f3bfa4cf0f4b7110c203c2306b98360dc46505", 0xec, 0x7a}]) 21:58:40 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x8800, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:40 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0xfeffff0700000000, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:40 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='\x00\x00\x00\x00%', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 21:58:40 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x103) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000400)={{{@in, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000500)=0xe8) lstat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_tcp(&(0x7f0000000700)='127.0.0.1\x00', &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='9p\x00', 0x4, &(0x7f00000007c0)={'trans=tcp,', {'port', 0x3d, 0x4e23}, 0x2c, {[{@posixacl='posixacl'}], [{@seclabel='seclabel'}, {@fowner_lt={'fowner<', r2}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}, {@smackfsroot={'smackfsroot', 0x3d, '^#+'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}}) mount$fuse(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='fuse\x00', 0x80000, &(0x7f0000000600)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}], [{@mask={'mask', 0x3d, 'MAY_EXEC'}}]}}) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000040)={0x0, 0x73, "3b09e06a5411cef6736bbe4e41db76849733b94435fd69eb05e5698624124205e4a0ae452cc3b964e4b95063fa198fbfbaa0052f7bd8b50472660a82e9fd8009213a3020338e07f598708682f99dc36f30f85706b6621a05b93a222c11195ce27ab083354d12c026636f14ea982f96cbcd04db"}, &(0x7f00000001c0)=0x7b) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000280)={r4, 0x54, &(0x7f0000000200)=[@in6={0xa, 0x4e20, 0xc6a, @mcast1, 0x1}, @in6={0xa, 0x4e23, 0x0, @ipv4, 0x5}, @in6={0xa, 0x4e20, 0x1, @ipv4={[], [], @remote}, 0x40}]}, &(0x7f00000002c0)=0x10) 21:58:40 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:40 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x5000000, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:40 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f00000015c0)=[{&(0x7f0000000500)="f10457d357850ba96b3177c5432bf4d57c0df1e6e18ce27b33d45d2e44ea456be44eda49bb10e571862513b61f102eed99409fc67556483b021260a6f33dc13da1d50ddc83aa3a84a6f07efb3392e1a070fc93147c678e2c4902fd60a9f8022b1cd2f6cce4395660373a5d44cfb97743fa1936d10e0eca652e427449e026f4fc95277e2947ff7c23e8a9600b8d1f68338c57cab04985c591388803e6596d8bae0bd479bae6846d61e8fefe2551fc2e9859203159a172db93cf6c8c8f5905d602d33c5960cd9ee8105d2fa64f2dff6e70f20c95ec33e98d0588f3bfa4cf0f4b7110c203c2306b98360dc46505", 0xec, 0x7a}]) 21:58:40 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:40 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'|ebug_want_extra_isize'}}]}) [ 683.155022] EXT4-fs: 18 callbacks suppressed [ 683.155035] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 21:58:40 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:40 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x5, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 683.237573] EXT4-fs (sda1): re-mounted. Opts: 21:58:40 executing program 3 (fault-call:0 fault-nth:0): syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:58:40 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f00000015c0)=[{&(0x7f0000000500)="f10457d357850ba96b3177c5432bf4d57c0df1e6e18ce27b33d45d2e44ea456be44eda49bb10e571862513b61f102eed99409fc67556483b021260a6f33dc13da1d50ddc83aa3a84a6f07efb3392e1a070fc93147c678e2c4902fd60a9f8022b1cd2f6cce4395660373a5d44cfb97743fa1936d10e0eca652e427449e026f4fc95277e2947ff7c23e8a9600b8d1f68338c57cab04985c591388803e6596d8bae0bd479bae6846d61e8fefe2551fc2e9859203159a172db93cf6c8c8f5905d602d33c5960cd9ee8105d2fa64f2dff6e70f20c95ec33e98d0588f3bfa4cf0f4b7110c203c2306b98360dc46505", 0xec, 0x7a}]) [ 683.276672] 9pnet: p9_fd_create_tcp (5287): problem connecting socket to 127.0.0.1 [ 683.311936] EXT4-fs (sda1): Unrecognized mount option "|ebug_want_extra_isize=0x0000000000000000" or missing value 21:58:40 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 683.374059] FAULT_INJECTION: forcing a failure. [ 683.374059] name failslab, interval 1, probability 0, space 0, times 0 [ 683.390298] 9pnet: p9_fd_create_tcp (5285): problem connecting socket to 127.0.0.1 [ 683.402939] EXT4-fs (sda1): re-mounted. Opts: [ 683.407532] CPU: 0 PID: 5298 Comm: syz-executor3 Not tainted 4.19.0+ #92 [ 683.414423] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 683.423791] Call Trace: [ 683.426424] dump_stack+0x244/0x39d [ 683.430077] ? dump_stack_print_info.cold.1+0x20/0x20 [ 683.435291] ? lock_downgrade+0x900/0x900 [ 683.439465] should_fail.cold.4+0xa/0x17 [ 683.443548] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 683.448676] ? lock_downgrade+0x900/0x900 [ 683.452839] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 683.458393] ? proc_fail_nth_write+0x9e/0x210 [ 683.462906] ? proc_cwd_link+0x1d0/0x1d0 [ 683.466991] ? find_held_lock+0x36/0x1c0 [ 683.471081] ? perf_trace_wbc_class+0x608/0xb60 [ 683.475790] ? perf_trace_sched_process_exec+0x860/0x860 [ 683.481262] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 683.486821] __should_failslab+0x124/0x180 [ 683.491075] should_failslab+0x9/0x14 [ 683.494893] __kmalloc+0x2e0/0x760 [ 683.498446] ? strncpy_from_user+0x5a0/0x5a0 [ 683.502865] ? fput+0x130/0x1a0 [ 683.506161] ? do_syscall_64+0x9a/0x820 [ 683.510149] ? __x64_sys_memfd_create+0x142/0x4f0 [ 683.515017] ? do_syscall_64+0x9a/0x820 [ 683.519017] __x64_sys_memfd_create+0x142/0x4f0 [ 683.523702] ? memfd_fcntl+0x1910/0x1910 [ 683.527796] do_syscall_64+0x1b9/0x820 [ 683.531700] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 683.537078] ? syscall_return_slowpath+0x5e0/0x5e0 [ 683.542031] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 683.546920] ? trace_hardirqs_on_caller+0x310/0x310 [ 683.551951] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 683.556981] ? prepare_exit_to_usermode+0x291/0x3b0 [ 683.562016] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 683.566891] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 683.572094] RIP: 0033:0x457569 [ 683.575300] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 683.594210] RSP: 002b:00007f9f77a49a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 683.601935] RAX: ffffffffffffffda RBX: 00000000200002c0 RCX: 0000000000457569 [ 683.609210] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a [ 683.616488] RBP: 000000000072bf00 R08: 0000000000000000 R09: 00000000fbad8001 21:58:40 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x4, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 683.623771] R10: 00000000200002c0 R11: 0000000000000246 R12: 00007f9f77a4a6d4 [ 683.631059] R13: 00000000004c4d12 R14: 00000000004d8320 R15: 0000000000000003 21:58:40 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) r0 = open(&(0x7f0000000040)='./file0\x00', 0x2200, 0x2) ioctl$KVM_SET_ONE_REG(r0, 0x4010aeac, &(0x7f0000000080)={0xffffffffffffff15}) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)) 21:58:40 executing program 3 (fault-call:0 fault-nth:1): syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) [ 683.680962] EXT4-fs (sda1): Unrecognized mount option "|ebug_want_extra_isize=0x0000000000000000" or missing value 21:58:41 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x1100000000000000, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:41 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:41 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 683.797933] FAULT_INJECTION: forcing a failure. [ 683.797933] name failslab, interval 1, probability 0, space 0, times 0 [ 683.817684] CPU: 1 PID: 5315 Comm: syz-executor3 Not tainted 4.19.0+ #92 [ 683.824557] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 683.833912] Call Trace: [ 683.836528] dump_stack+0x244/0x39d [ 683.840176] ? dump_stack_print_info.cold.1+0x20/0x20 [ 683.845398] should_fail.cold.4+0xa/0x17 [ 683.849479] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 683.854607] ? find_held_lock+0x36/0x1c0 [ 683.854632] ? zap_class+0x640/0x640 [ 683.854651] ? __lock_acquire+0x62f/0x4c20 [ 683.866646] ? lock_downgrade+0x900/0x900 [ 683.870808] ? check_preemption_disabled+0x48/0x280 [ 683.875843] ? find_held_lock+0x36/0x1c0 [ 683.879933] ? expand_files.part.8+0x571/0x9a0 [ 683.884536] ? perf_trace_sched_process_exec+0x860/0x860 [ 683.890007] ? find_held_lock+0x36/0x1c0 [ 683.894092] __should_failslab+0x124/0x180 [ 683.898345] should_failslab+0x9/0x14 [ 683.902160] kmem_cache_alloc+0x2be/0x730 [ 683.906333] ? shmem_destroy_callback+0xc0/0xc0 [ 683.911027] shmem_alloc_inode+0x1b/0x40 [ 683.915109] alloc_inode+0x63/0x190 [ 683.918750] new_inode_pseudo+0x71/0x1a0 [ 683.922835] ? prune_icache_sb+0x1c0/0x1c0 [ 683.927086] ? _raw_spin_unlock+0x2c/0x50 [ 683.931278] new_inode+0x1c/0x40 [ 683.934653] shmem_get_inode+0xf1/0x920 [ 683.938637] ? shmem_encode_fh+0x340/0x340 [ 683.942888] ? lock_downgrade+0x900/0x900 [ 683.947057] ? lock_release+0xa00/0xa00 [ 683.951051] ? perf_trace_sched_process_exec+0x860/0x860 [ 683.956513] ? usercopy_warn+0x110/0x110 [ 683.956553] __shmem_file_setup.part.50+0x83/0x2a0 [ 683.956574] shmem_file_setup+0x65/0x90 [ 683.965564] __x64_sys_memfd_create+0x2af/0x4f0 [ 683.965582] ? memfd_fcntl+0x1910/0x1910 [ 683.965616] do_syscall_64+0x1b9/0x820 [ 683.982178] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 683.987559] ? syscall_return_slowpath+0x5e0/0x5e0 [ 683.992501] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 683.997363] ? trace_hardirqs_on_caller+0x310/0x310 [ 684.002393] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 684.007418] ? prepare_exit_to_usermode+0x291/0x3b0 [ 684.012482] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 684.017384] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 684.022606] RIP: 0033:0x457569 [ 684.025809] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 21:58:41 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'d\nbug_want_extra_isize'}}]}) 21:58:41 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:41 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f00000015c0)=[{&(0x7f0000000500)="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", 0x162, 0x7a}]) [ 684.044714] RSP: 002b:00007f9f77a49a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 684.052446] RAX: ffffffffffffffda RBX: 00000000200002c0 RCX: 0000000000457569 [ 684.059732] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a [ 684.067026] RBP: 000000000072bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 684.074301] R10: 00000000200002c0 R11: 0000000000000246 R12: 00007f9f77a4a6d4 [ 684.081576] R13: 00000000004c4d12 R14: 00000000004d8320 R15: 0000000000000003 21:58:41 executing program 3 (fault-call:0 fault-nth:2): syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:58:41 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:41 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000627, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 684.165778] EXT4-fs (sda1): re-mounted. Opts: [ 684.230094] FAULT_INJECTION: forcing a failure. [ 684.230094] name failslab, interval 1, probability 0, space 0, times 0 21:58:41 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 684.270883] CPU: 1 PID: 5333 Comm: syz-executor3 Not tainted 4.19.0+ #92 [ 684.277807] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 684.287168] Call Trace: [ 684.287197] dump_stack+0x244/0x39d [ 684.287221] ? dump_stack_print_info.cold.1+0x20/0x20 [ 684.287241] ? find_held_lock+0x36/0x1c0 [ 684.287274] should_fail.cold.4+0xa/0x17 [ 684.293482] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 684.293500] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 684.293530] ? kasan_check_read+0x11/0x20 [ 684.320968] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 684.326254] ? rcu_softirq_qs+0x20/0x20 [ 684.330239] ? rcu_softirq_qs+0x20/0x20 [ 684.334222] ? unwind_dump+0x190/0x190 [ 684.338134] ? is_bpf_text_address+0xd3/0x170 [ 684.342673] ? kernel_text_address+0x79/0xf0 [ 684.347132] ? __kernel_text_address+0xd/0x40 [ 684.351636] ? unwind_get_return_address+0x61/0xa0 [ 684.356580] ? __save_stack_trace+0x8d/0xf0 [ 684.361443] ? perf_trace_sched_process_exec+0x860/0x860 [ 684.366914] ? save_stack+0x43/0xd0 [ 684.370558] ? kasan_kmalloc+0xc7/0xe0 [ 684.374455] ? kasan_slab_alloc+0x12/0x20 [ 684.378611] ? kmem_cache_alloc+0x12e/0x730 [ 684.382975] ? shmem_alloc_inode+0x1b/0x40 [ 684.387268] __should_failslab+0x124/0x180 [ 684.391566] should_failslab+0x9/0x14 [ 684.395377] kmem_cache_alloc+0x2be/0x730 [ 684.399540] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 684.404573] ? map_id_range_down+0x1ee/0x430 [ 684.409004] new_inode_smack+0x20/0xb0 [ 684.412905] smack_inode_alloc_security+0x92/0x100 [ 684.417867] security_inode_alloc+0x73/0xd0 [ 684.422204] inode_init_always+0x68f/0xd80 [ 684.426461] ? get_nr_inodes+0x120/0x120 [ 684.430539] ? rcu_pm_notify+0xc0/0xc0 [ 684.434454] ? rcu_read_lock_sched_held+0x14f/0x180 [ 684.439479] ? kmem_cache_alloc+0x33a/0x730 [ 684.443820] ? shmem_alloc_inode+0x1b/0x40 [ 684.448080] ? shmem_destroy_callback+0xc0/0xc0 [ 684.452807] alloc_inode+0x80/0x190 [ 684.456446] new_inode_pseudo+0x71/0x1a0 [ 684.460520] ? prune_icache_sb+0x1c0/0x1c0 [ 684.464790] ? _raw_spin_unlock+0x2c/0x50 [ 684.468956] new_inode+0x1c/0x40 [ 684.472336] shmem_get_inode+0xf1/0x920 [ 684.476324] ? shmem_encode_fh+0x340/0x340 [ 684.480578] ? lock_downgrade+0x900/0x900 [ 684.484741] ? lock_release+0xa00/0xa00 [ 684.488753] ? perf_trace_sched_process_exec+0x860/0x860 [ 684.494222] ? usercopy_warn+0x110/0x110 [ 684.498334] __shmem_file_setup.part.50+0x83/0x2a0 [ 684.503300] shmem_file_setup+0x65/0x90 [ 684.507287] __x64_sys_memfd_create+0x2af/0x4f0 [ 684.511967] ? memfd_fcntl+0x1910/0x1910 [ 684.516052] do_syscall_64+0x1b9/0x820 [ 684.519958] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 684.525335] ? syscall_return_slowpath+0x5e0/0x5e0 [ 684.530281] ? trace_hardirqs_on_caller+0x310/0x310 [ 684.535306] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 684.540338] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 684.547022] ? __switch_to_asm+0x40/0x70 [ 684.551090] ? __switch_to_asm+0x34/0x70 [ 684.555197] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 684.560062] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 684.565257] RIP: 0033:0x457569 [ 684.568474] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 684.587446] RSP: 002b:00007f9f77a49a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 684.595166] RAX: ffffffffffffffda RBX: 00000000200002c0 RCX: 0000000000457569 [ 684.602443] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a [ 684.609717] RBP: 000000000072bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 684.617011] R10: 00000000200002c0 R11: 0000000000000246 R12: 00007f9f77a4a6d4 [ 684.624283] R13: 00000000004c4d12 R14: 00000000004d8320 R15: 0000000000000003 [ 684.632449] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 684.640180] EXT4-fs (sda1): re-mounted. Opts: [ 684.653871] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 684.662311] EXT4-fs (sda1): Unrecognized mount option "d [ 684.662311] bug_want_extra_isize=0x0000000000000000" or missing value 21:58:41 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x40000, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x1ffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000001c0)=@vsock, &(0x7f0000000080)=0x80) ioctl$LOOP_SET_FD(r0, 0x4c00, r0) 21:58:41 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f00000015c0)=[{&(0x7f0000000500)="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", 0x162, 0x7a}]) 21:58:41 executing program 3 (fault-call:0 fault-nth:3): syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:58:41 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660, 0x200000000000000], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:42 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 684.757594] FAULT_INJECTION: forcing a failure. [ 684.757594] name failslab, interval 1, probability 0, space 0, times 0 [ 684.779344] EXT4-fs (sda1): Unrecognized mount option "d [ 684.779344] bug_want_extra_isize=0x0000000000000000" or missing value [ 684.807363] CPU: 0 PID: 5350 Comm: syz-executor3 Not tainted 4.19.0+ #92 [ 684.814237] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 684.823600] Call Trace: [ 684.826211] dump_stack+0x244/0x39d [ 684.829860] ? dump_stack_print_info.cold.1+0x20/0x20 [ 684.829898] should_fail.cold.4+0xa/0x17 [ 684.829923] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 684.829944] ? __kernel_text_address+0xd/0x40 [ 684.829965] ? unwind_get_return_address+0x61/0xa0 [ 684.829994] ? __lockdep_init_map+0x105/0x590 [ 684.839236] ? lockdep_init_map+0x9/0x10 [ 684.839252] ? debug_mutex_init+0x2d/0x60 [ 684.839275] ? find_held_lock+0x36/0x1c0 [ 684.839316] ? perf_trace_sched_process_exec+0x860/0x860 [ 684.839343] __should_failslab+0x124/0x180 [ 684.839364] should_failslab+0x9/0x14 [ 684.884070] kmem_cache_alloc+0x2be/0x730 [ 684.888235] ? mpol_shared_policy_init+0x235/0x650 [ 684.893175] ? current_time+0x72/0x1b0 [ 684.897087] __d_alloc+0xc8/0xb90 [ 684.900559] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 684.905587] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 684.910631] ? ktime_get_coarse_real_ts64+0x22e/0x370 [ 684.915828] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 684.921380] ? timespec64_trunc+0xea/0x180 [ 684.925629] ? inode_init_owner+0x340/0x340 [ 684.929967] ? _raw_spin_unlock+0x2c/0x50 [ 684.934129] ? current_time+0x131/0x1b0 [ 684.938119] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 684.943669] ? __lockdep_init_map+0x105/0x590 [ 684.948191] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 684.953776] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 684.959350] d_alloc_pseudo+0x1d/0x30 [ 684.963170] alloc_file_pseudo+0x158/0x3f0 [ 684.967426] ? alloc_file+0x4d0/0x4d0 [ 684.971241] ? usercopy_warn+0x110/0x110 [ 684.975329] __shmem_file_setup.part.50+0x110/0x2a0 [ 684.980390] shmem_file_setup+0x65/0x90 [ 684.984380] __x64_sys_memfd_create+0x2af/0x4f0 [ 684.989065] ? memfd_fcntl+0x1910/0x1910 [ 684.993155] do_syscall_64+0x1b9/0x820 [ 684.997065] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 685.002447] ? syscall_return_slowpath+0x5e0/0x5e0 [ 685.007391] ? trace_hardirqs_on_caller+0x310/0x310 [ 685.012421] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 685.017481] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 685.024178] ? __switch_to_asm+0x40/0x70 [ 685.028247] ? __switch_to_asm+0x34/0x70 [ 685.032328] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 685.037196] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 685.042388] RIP: 0033:0x457569 [ 685.045586] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 685.064499] RSP: 002b:00007f9f77a49a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 685.072224] RAX: ffffffffffffffda RBX: 00000000200002c0 RCX: 0000000000457569 [ 685.079500] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a [ 685.079511] RBP: 000000000072bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 685.079521] R10: 00000000200002c0 R11: 0000000000000246 R12: 00007f9f77a4a6d4 21:58:42 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660, 0x7802000000000000], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:42 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:42 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'d%bug_want_extra_isize'}}]}) 21:58:42 executing program 3 (fault-call:0 fault-nth:4): syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) [ 685.079529] R13: 00000000004c4d12 R14: 00000000004d8320 R15: 0000000000000003 21:58:42 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f00000015c0)=[{&(0x7f0000000500)="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", 0x162, 0x7a}]) [ 685.191603] FAULT_INJECTION: forcing a failure. [ 685.191603] name failslab, interval 1, probability 0, space 0, times 0 [ 685.216281] CPU: 0 PID: 5362 Comm: syz-executor3 Not tainted 4.19.0+ #92 [ 685.223163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 685.232528] Call Trace: [ 685.235144] dump_stack+0x244/0x39d [ 685.238811] ? dump_stack_print_info.cold.1+0x20/0x20 [ 685.244053] should_fail.cold.4+0xa/0x17 [ 685.248144] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 685.253288] ? __kernel_text_address+0xd/0x40 [ 685.257813] ? unwind_get_return_address+0x61/0xa0 [ 685.257841] ? __lockdep_init_map+0x105/0x590 [ 685.257860] ? lockdep_init_map+0x9/0x10 [ 685.267391] ? debug_mutex_init+0x2d/0x60 [ 685.267416] ? find_held_lock+0x36/0x1c0 [ 685.267442] ? xfrm_input+0x16f8/0x3190 [ 685.267472] ? perf_trace_sched_process_exec+0x860/0x860 [ 685.289272] __should_failslab+0x124/0x180 [ 685.293532] should_failslab+0x9/0x14 [ 685.297357] kmem_cache_alloc+0x2be/0x730 [ 685.301558] ? mpol_shared_policy_init+0x235/0x650 [ 685.306518] ? current_time+0x72/0x1b0 [ 685.310440] __d_alloc+0xc8/0xb90 [ 685.313922] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 685.318959] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 685.324008] ? ktime_get_coarse_real_ts64+0x22e/0x370 [ 685.329227] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 685.334814] ? timespec64_trunc+0xea/0x180 [ 685.339080] ? inode_init_owner+0x340/0x340 [ 685.343436] ? _raw_spin_unlock+0x2c/0x50 [ 685.347610] ? current_time+0x131/0x1b0 [ 685.351630] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 685.357202] ? __lockdep_init_map+0x105/0x590 [ 685.361951] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 685.367512] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 685.373086] d_alloc_pseudo+0x1d/0x30 [ 685.376919] alloc_file_pseudo+0x158/0x3f0 [ 685.381186] ? alloc_file+0x4d0/0x4d0 [ 685.385015] ? usercopy_warn+0x110/0x110 21:58:42 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660, 0x1100000000000000], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 685.389120] __shmem_file_setup.part.50+0x110/0x2a0 [ 685.394170] shmem_file_setup+0x65/0x90 [ 685.398174] __x64_sys_memfd_create+0x2af/0x4f0 [ 685.402869] ? memfd_fcntl+0x1910/0x1910 [ 685.406969] do_syscall_64+0x1b9/0x820 [ 685.410889] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 685.416281] ? syscall_return_slowpath+0x5e0/0x5e0 [ 685.421236] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 685.426110] ? trace_hardirqs_on_caller+0x310/0x310 [ 685.431150] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 685.436195] ? prepare_exit_to_usermode+0x291/0x3b0 [ 685.441243] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 685.446122] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 685.446136] RIP: 0033:0x457569 [ 685.446153] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 685.446169] RSP: 002b:00007f9f77a49a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 685.473498] RAX: ffffffffffffffda RBX: 00000000200002c0 RCX: 0000000000457569 21:58:42 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 685.473509] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a [ 685.473517] RBP: 000000000072bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 685.473525] R10: 00000000200002c0 R11: 0000000000000246 R12: 00007f9f77a4a6d4 [ 685.473534] R13: 00000000004c4d12 R14: 00000000004d8320 R15: 0000000000000003 [ 685.530153] EXT4-fs (sda1): re-mounted. Opts: 21:58:42 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x3, 0x6, &(0x7f00000015c0)=[{&(0x7f00000001c0)="cee0448ae52399ad0d77c714dde3153e8ffb4fbfb33e8ae137cf23292d9b5008e9fa3554bbd9c7e0653abae5545edad8430dbc5015511d91dee5b88507838cd8a4a56281b8ede75836563bac7d0a792a6ffd17ce1b2fa2f501870490ecf3ec25b94c66777d820ec6391d43b441c8cc96cdf1173319fedb4c687ddfcd7cbafbdda3e88657e3456e10d2d5e3116ba045904a227813eb", 0x95, 0x8}, {&(0x7f0000000340)="6630b9ce1e75271155937b2371968de3e08710ffd8c2385c6550bd2e368f173740498e14f315c3d92ac459da5ec5184f91da1cf388e239f897c8e4be71f795abc380e92b293505aff135916d6757e04b098dd493f8fb86cc951b021b1dbc9b945608c8a7c82fade1095a79c6e316e3ee207fa197e5bc36c1546e958214579315e64a01b62529f9c9e784d61ee85187272f1e2d5d19742011a434fd26a7f084d2465e639ca83e112dcf47139b7e3822dfb8", 0xb1, 0x9}, {&(0x7f0000000400)="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", 0x1000, 0x80000001}, {&(0x7f0000000040)="46647fb1901d9bee43d0d66912533977f3b468a117af7afa4d1a58b42fc01713cca34fe6af6fba3cb7dcbb0426da7d43473c5571de90617a98e783cda1b250b0a9de5bb5f8d897a785f59e2797b1ac0e766d11e465f9764fb284ccc6851804a60092c071", 0x64, 0x80}, {&(0x7f0000001400)="3a581f2681679ba97a598de370cb17acd94a2a1cb161f80454c6fd26d1d84fe095a561051530d8ee812ad759ed7d92b0aca818a2d532f669bedeab780b76e59e22eef620f04ac853ce6a96696f11931803c5059f4b9965b136ee07cd799dae237f568fa4f423b08952925cf613a82469184c8d0db867b783b260479a2683c7720c17662153f7140b6f", 0x89, 0x3a}, {&(0x7f00000014c0)="9eb743c5af0f058fbd8d6f17defb9a47c7a5aa34f581f92fbf9a136350ace158e289e9ebbe3707f95498114e77f4546859222fce69c850d10b3e221d0422d2ef59730ac6828a4028df4ffbca3f976e27befbe069033e786ffa221f92eb8447a73bce7342a4349401737c6f9634101119fd8055fa6d9eddd8f2810e94ee295d7570ec5236bc3ba85c5cbaa068d6ba62da2d03cf6d72912c59b0ca57b03ff402b37d6240d7e730c760227585c43e8369fa21af8cb5a450f3d6b0f99e859d87a38de5d04d9a38977503473015f4cfcb85dc2d6bc9f2921636dfc90350393f0c6188e96f7f75147a1de03c1c63", 0xeb, 0x2}], 0x100020, &(0x7f0000000300)) 21:58:42 executing program 3 (fault-call:0 fault-nth:5): syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:58:42 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:42 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660, 0x7fffffe], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:42 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f00000015c0)=[{&(0x7f0000000500)="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", 0x19d, 0x7a}]) [ 685.651261] FAULT_INJECTION: forcing a failure. [ 685.651261] name failslab, interval 1, probability 0, space 0, times 0 21:58:42 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 685.691528] CPU: 0 PID: 5380 Comm: syz-executor3 Not tainted 4.19.0+ #92 [ 685.698429] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 685.707822] Call Trace: [ 685.710452] dump_stack+0x244/0x39d [ 685.714115] ? dump_stack_print_info.cold.1+0x20/0x20 [ 685.714141] ? smk_access_entry+0x310/0x310 [ 685.714161] ? find_held_lock+0x36/0x1c0 [ 685.714193] should_fail.cold.4+0xa/0x17 [ 685.731929] ? find_held_lock+0x36/0x1c0 [ 685.731955] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 685.731980] ? lock_downgrade+0x900/0x900 [ 685.732002] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 685.732021] ? timespec64_trunc+0xea/0x180 [ 685.732047] ? inode_init_owner+0x340/0x340 [ 685.732069] ? find_held_lock+0x36/0x1c0 [ 685.732105] ? perf_trace_sched_process_exec+0x860/0x860 [ 685.732127] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 685.775049] __should_failslab+0x124/0x180 [ 685.779320] should_failslab+0x9/0x14 [ 685.783147] kmem_cache_alloc+0x2be/0x730 [ 685.787317] ? do_sys_ftruncate+0x428/0x550 [ 685.791667] ? lock_downgrade+0x900/0x900 [ 685.795845] getname_flags+0xd0/0x590 [ 685.799714] ? __lock_is_held+0xb5/0x140 [ 685.803820] getname+0x19/0x20 [ 685.807044] do_sys_open+0x383/0x700 [ 685.810809] ? filp_open+0x80/0x80 [ 685.814378] ? trace_hardirqs_off_caller+0x310/0x310 [ 685.819504] ? do_sys_ftruncate+0x449/0x550 [ 685.823851] __x64_sys_open+0x7e/0xc0 [ 685.827677] do_syscall_64+0x1b9/0x820 [ 685.831590] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 685.836986] ? syscall_return_slowpath+0x5e0/0x5e0 21:58:43 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660, 0x300000000000000], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 685.842049] ? trace_hardirqs_on_caller+0x310/0x310 [ 685.847098] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 685.852140] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 685.858842] ? __switch_to_asm+0x40/0x70 [ 685.862931] ? __switch_to_asm+0x34/0x70 [ 685.867020] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 685.871910] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 685.877119] RIP: 0033:0x4111a1 [ 685.880336] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 685.899253] RSP: 002b:00007f9f77a49a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 685.899270] RAX: ffffffffffffffda RBX: 00000000200002d0 RCX: 00000000004111a1 [ 685.899280] RDX: 00007f9f77a49afa RSI: 0000000000000002 RDI: 00007f9f77a49af0 [ 685.899290] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 685.899300] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 685.899309] R13: 0000000000000000 R14: 00000000004d8320 R15: 0000000000000003 [ 685.923086] Dev loop4: unable to read RDB block 1 [ 685.976274] loop4: unable to read partition table [ 685.981985] loop4: partition table beyond EOD, truncated 21:58:43 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'de%ug_want_extra_isize'}}]}) 21:58:43 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:43 executing program 3 (fault-call:0 fault-nth:6): syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:58:43 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660, 0x700000000000000], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 685.998129] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 686.091006] FAULT_INJECTION: forcing a failure. [ 686.091006] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 686.102874] CPU: 1 PID: 5403 Comm: syz-executor3 Not tainted 4.19.0+ #92 [ 686.102887] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 686.102893] Call Trace: [ 686.102921] dump_stack+0x244/0x39d [ 686.102947] ? dump_stack_print_info.cold.1+0x20/0x20 [ 686.102980] should_fail.cold.4+0xa/0x17 [ 686.103004] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 686.125466] ? print_usage_bug+0xc0/0xc0 [ 686.125499] ? mark_held_locks+0x130/0x130 [ 686.125516] ? zap_class+0x640/0x640 [ 686.125544] ? smk_access+0x53b/0x700 [ 686.139934] ? print_usage_bug+0xc0/0xc0 [ 686.139955] ? zap_class+0x640/0x640 [ 686.139974] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 686.139993] ? smack_log+0x423/0x590 [ 686.140014] ? find_held_lock+0x36/0x1c0 [ 686.140036] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 686.148358] ? should_fail+0x22d/0xd01 [ 686.148376] ? find_held_lock+0x36/0x1c0 [ 686.148397] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 686.148426] __alloc_pages_nodemask+0x34b/0xde0 [ 686.200395] ? __alloc_pages_slowpath+0x2e10/0x2e10 [ 686.205575] ? inode_init_owner+0x340/0x340 [ 686.209943] ? find_held_lock+0x36/0x1c0 [ 686.214055] ? trace_hardirqs_off+0xb8/0x310 [ 686.218500] cache_grow_begin+0xa5/0x8c0 [ 686.222598] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 686.228394] ? check_preemption_disabled+0x48/0x280 [ 686.233459] kmem_cache_alloc+0x66b/0x730 [ 686.237634] ? do_sys_ftruncate+0x428/0x550 [ 686.241993] getname_flags+0xd0/0x590 [ 686.245838] ? __lock_is_held+0xb5/0x140 [ 686.250008] getname+0x19/0x20 [ 686.253229] do_sys_open+0x383/0x700 [ 686.256970] ? filp_open+0x80/0x80 [ 686.260544] ? trace_hardirqs_off_caller+0x310/0x310 [ 686.265674] ? do_sys_ftruncate+0x449/0x550 [ 686.270023] __x64_sys_open+0x7e/0xc0 [ 686.273858] do_syscall_64+0x1b9/0x820 [ 686.277793] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 686.283256] ? syscall_return_slowpath+0x5e0/0x5e0 [ 686.288213] ? trace_hardirqs_on_caller+0x310/0x310 [ 686.293256] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 686.298299] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 686.305069] ? __switch_to_asm+0x40/0x70 [ 686.309157] ? __switch_to_asm+0x34/0x70 [ 686.313251] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 686.318131] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 686.323750] RIP: 0033:0x4111a1 21:58:43 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f00000015c0)=[{&(0x7f0000000500)="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", 0x19d, 0x7a}]) 21:58:43 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000280)=[{&(0x7f00000001c0)="ab430afc854edbfdadef3269014cb9c76b3f028121d0f436508396b77f032839702fe78569e232ce0ac3f10b84777744ae000f17d675ff1261f6638d503070f3657fa78fe5975089e116e36092d969d26e237b92f920d967b2caf989a43fbebf9af037155a53ae8f4e8dd523c6f42825e6a1d03baadc581a8fcf3d12bbc8a6a1bcad41c3144c9d23f4443d6d0a880a13830c5f84664a29d3dea6687f48f1a11029eb73243de0a71712a6424c49578810fbb370fe4cbdbda7cd9f3a3b0fd7e0c2", 0xc0, 0x40}, {&(0x7f0000000340)="b8fc2ca0a916b0f8decdc2f6e7dd33069bdca019d5b2c38dffa0586496a4f43a2999f5465a03815e0dc13b9562ff5d730bc85f04b7492b90650b5d0af1d4de1131b449d3dc553260f7dd70adbb3de2ca268de18c81a2496c5f62b30a7463502d632cbb209850b64729979f081c427a683147b97e908ede6501f824224642b629567961de331b0eaba945569eea260d17512dc25b2c21307718577113f3509901c52d4a358598a14983dbf54d624c03275fdc4d181a5d8147156f3904faad6458b2ed41358db8ff15c774c34e55747d72f00f7d0578b0c90f647662c3dfba23f6fe3854038f98dd", 0xe7, 0x36b8}, {&(0x7f0000000080)="765d5b70869050aedd9c2a95b029dc3429646d4d51ae059cf325ec0f4ebc8720d2e7038344b4c84c3f5323408dfd5e4b1c951c883025ced687882cf6c7", 0x3d, 0xb11}], 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="00e97086e39b06e61a6bcdedee0a8cb9ecd5762d2784636d90f9da1508c232d618e06f26ba1743cc0400000000000000fab81a8e6aee0459df1152f10cf4c752b5a5cba579e8d3fd49ba2f0e15f4bc3f3d72a5811e7fbc57595a9edf568c6f7a997942072aa01d987cad4d69bf"]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000540)='/dev/audio\x00', 0x10080, 0x0) connect$unix(r0, &(0x7f0000000440)=@file={0x1, './file0\x00'}, 0x6e) [ 686.326990] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 686.346035] RSP: 002b:00007f9f77a49a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 686.353786] RAX: ffffffffffffffda RBX: 00000000200002d0 RCX: 00000000004111a1 [ 686.361077] RDX: 00007f9f77a49afa RSI: 0000000000000002 RDI: 00007f9f77a49af0 [ 686.368376] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 686.375668] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 686.382960] R13: 0000000000000000 R14: 00000000004d8320 R15: 0000000000000003 21:58:43 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:43 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660, 0x2000000], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:43 executing program 3 (fault-call:0 fault-nth:7): syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) [ 686.460191] Dev loop4: unable to read RDB block 1 [ 686.465304] loop4: unable to read partition table [ 686.480730] loop4: partition table beyond EOD, truncated 21:58:43 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:43 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660, 0x4], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 686.514446] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 21:58:43 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f00000015c0)=[{&(0x7f0000000500)="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", 0x163, 0x7a}]) [ 686.601680] FAULT_INJECTION: forcing a failure. [ 686.601680] name failslab, interval 1, probability 0, space 0, times 0 [ 686.651760] CPU: 0 PID: 5429 Comm: syz-executor3 Not tainted 4.19.0+ #92 [ 686.658695] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 686.668076] Call Trace: [ 686.668107] dump_stack+0x244/0x39d [ 686.668133] ? dump_stack_print_info.cold.1+0x20/0x20 [ 686.679562] should_fail.cold.4+0xa/0x17 [ 686.679583] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 686.679601] ? down_write_nested+0x130/0x130 [ 686.679616] ? down_read+0x120/0x120 [ 686.679643] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 686.702506] ? zap_class+0x640/0x640 [ 686.706242] ? lock_acquire+0x1ed/0x520 [ 686.710241] ? lo_ioctl+0x8e/0x1d60 [ 686.710266] ? find_held_lock+0x36/0x1c0 [ 686.710286] ? __lock_is_held+0xb5/0x140 [ 686.710301] ? erofs_lookup+0x3f8/0x700 [ 686.710332] ? perf_trace_sched_process_exec+0x860/0x860 [ 686.710359] __should_failslab+0x124/0x180 [ 686.718064] should_failslab+0x9/0x14 [ 686.718083] kmem_cache_alloc_trace+0x2d7/0x750 [ 686.718106] ? check_preemption_disabled+0x48/0x280 [ 686.749675] __kthread_create_on_node+0x137/0x540 [ 686.754553] ? loop_get_status64+0x140/0x140 [ 686.758986] ? kthread_parkme+0xb0/0xb0 [ 686.763008] ? __lockdep_init_map+0x105/0x590 [ 686.767538] ? __lockdep_init_map+0x105/0x590 [ 686.772069] ? loop_get_status64+0x140/0x140 [ 686.776506] kthread_create_on_node+0xb1/0xe0 [ 686.781033] ? __kthread_create_on_node+0x540/0x540 [ 686.786080] ? kasan_check_read+0x11/0x20 [ 686.790264] lo_ioctl+0x7f6/0x1d60 [ 686.793840] ? lo_rw_aio+0x1ef0/0x1ef0 [ 686.797755] blkdev_ioctl+0x98e/0x21b0 [ 686.801698] ? blkpg_ioctl+0xc10/0xc10 [ 686.805699] ? lock_downgrade+0x900/0x900 [ 686.809897] ? check_preemption_disabled+0x48/0x280 [ 686.815489] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 686.820452] ? kasan_check_read+0x11/0x20 [ 686.824628] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 686.829933] ? rcu_softirq_qs+0x20/0x20 [ 686.833945] ? __fget+0x4d1/0x740 [ 686.837424] ? ksys_dup3+0x680/0x680 [ 686.841265] block_ioctl+0xee/0x130 [ 686.844913] ? blkdev_fallocate+0x400/0x400 [ 686.849261] do_vfs_ioctl+0x1de/0x1720 [ 686.853175] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 686.858738] ? ioctl_preallocate+0x300/0x300 [ 686.863196] ? memset+0x31/0x40 [ 686.866516] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 686.872082] ? smack_file_ioctl+0x210/0x3c0 [ 686.876424] ? fget_raw+0x20/0x20 [ 686.879971] ? smack_file_lock+0x2e0/0x2e0 [ 686.884236] ? rcu_read_lock_sched_held+0x14f/0x180 [ 686.889401] ? do_syscall_64+0x9a/0x820 [ 686.893402] ? do_syscall_64+0x9a/0x820 [ 686.897410] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 686.902980] ? security_file_ioctl+0x94/0xc0 [ 686.907428] ksys_ioctl+0xa9/0xd0 [ 686.910913] __x64_sys_ioctl+0x73/0xb0 [ 686.914839] do_syscall_64+0x1b9/0x820 [ 686.918757] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 686.924173] ? syscall_return_slowpath+0x5e0/0x5e0 [ 686.929131] ? trace_hardirqs_on_caller+0x310/0x310 [ 686.934187] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 686.939230] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 686.945957] ? __switch_to_asm+0x40/0x70 [ 686.950046] ? __switch_to_asm+0x34/0x70 [ 686.954140] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 686.959017] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 686.964233] RIP: 0033:0x4573d7 [ 686.967576] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 686.986688] RSP: 002b:00007f9f77a49a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 686.994431] RAX: ffffffffffffffda RBX: 00000000200002d0 RCX: 00000000004573d7 21:58:44 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'de\nug_want_extra_isize'}}]}) 21:58:44 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660, 0x7], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:44 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 687.001727] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 687.009214] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 687.016503] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 687.023828] R13: 0000000000000000 R14: 00000000004d8320 R15: 0000000000000003 21:58:44 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vhci\x00', 0x10900, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000200)={0x0, 0xc, "362f01c050d8a1e910234930"}, &(0x7f0000000240)=0x14) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000340)={r1, 0x9, 0x80}, 0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000280)={r1, 0x98}, &(0x7f00000002c0)=0x8) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)) r2 = dup(0xffffffffffffff9c) r3 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x200000) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={r2, r3, 0xf, 0x2}, 0x10) 21:58:44 executing program 3 (fault-call:0 fault-nth:8): syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:58:44 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660, 0x3000000], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:44 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:44 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f00000015c0)=[{&(0x7f0000000500)="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", 0x163, 0x7a}]) [ 687.223938] FAULT_INJECTION: forcing a failure. [ 687.223938] name failslab, interval 1, probability 0, space 0, times 0 [ 687.268493] CPU: 1 PID: 5449 Comm: syz-executor3 Not tainted 4.19.0+ #92 [ 687.275416] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 687.284980] Call Trace: [ 687.287612] dump_stack+0x244/0x39d [ 687.291281] ? dump_stack_print_info.cold.1+0x20/0x20 [ 687.296541] should_fail.cold.4+0xa/0x17 [ 687.300647] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 687.305804] ? down_write_nested+0x130/0x130 [ 687.310258] ? down_read+0x120/0x120 [ 687.310284] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 687.310304] ? zap_class+0x640/0x640 [ 687.310319] ? lock_acquire+0x1ed/0x520 [ 687.310336] ? lo_ioctl+0x8e/0x1d60 [ 687.310359] ? find_held_lock+0x36/0x1c0 [ 687.335054] ? __lock_is_held+0xb5/0x140 [ 687.339161] ? perf_trace_sched_process_exec+0x860/0x860 [ 687.344648] __should_failslab+0x124/0x180 [ 687.348921] should_failslab+0x9/0x14 [ 687.352751] kmem_cache_alloc_trace+0x2d7/0x750 [ 687.357595] ? check_preemption_disabled+0x48/0x280 [ 687.363221] __kthread_create_on_node+0x137/0x540 [ 687.368089] ? loop_get_status64+0x140/0x140 [ 687.372534] ? kthread_parkme+0xb0/0xb0 [ 687.376562] ? __lockdep_init_map+0x105/0x590 [ 687.381091] ? __lockdep_init_map+0x105/0x590 [ 687.385620] ? loop_get_status64+0x140/0x140 [ 687.390135] kthread_create_on_node+0xb1/0xe0 [ 687.394658] ? __kthread_create_on_node+0x540/0x540 [ 687.399708] ? kasan_check_read+0x11/0x20 [ 687.403900] lo_ioctl+0x7f6/0x1d60 [ 687.407473] ? lo_rw_aio+0x1ef0/0x1ef0 [ 687.411382] blkdev_ioctl+0x98e/0x21b0 [ 687.415295] ? blkpg_ioctl+0xc10/0xc10 [ 687.419204] ? lock_downgrade+0x900/0x900 [ 687.423378] ? check_preemption_disabled+0x48/0x280 [ 687.428493] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 687.433456] ? kasan_check_read+0x11/0x20 [ 687.437624] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 687.442927] ? rcu_softirq_qs+0x20/0x20 [ 687.446944] ? __fget+0x4d1/0x740 [ 687.450430] ? ksys_dup3+0x680/0x680 [ 687.454176] block_ioctl+0xee/0x130 [ 687.457845] ? blkdev_fallocate+0x400/0x400 [ 687.462195] do_vfs_ioctl+0x1de/0x1720 [ 687.466113] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 687.471683] ? ioctl_preallocate+0x300/0x300 [ 687.476122] ? memset+0x31/0x40 [ 687.479429] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 687.485001] ? smack_file_ioctl+0x210/0x3c0 [ 687.489350] ? fget_raw+0x20/0x20 [ 687.492836] ? smack_file_lock+0x2e0/0x2e0 [ 687.497099] ? rcu_read_lock_sched_held+0x14f/0x180 [ 687.502153] ? do_syscall_64+0x9a/0x820 [ 687.506144] ? do_syscall_64+0x9a/0x820 [ 687.510150] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 21:58:44 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:44 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:44 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:44 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 687.515715] ? security_file_ioctl+0x94/0xc0 [ 687.520157] ksys_ioctl+0xa9/0xd0 [ 687.523629] __x64_sys_ioctl+0x73/0xb0 [ 687.527645] do_syscall_64+0x1b9/0x820 [ 687.531556] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 687.536948] ? syscall_return_slowpath+0x5e0/0x5e0 [ 687.541913] ? trace_hardirqs_on_caller+0x310/0x310 [ 687.546962] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 687.552012] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 687.558710] ? __switch_to_asm+0x40/0x70 [ 687.562810] ? __switch_to_asm+0x34/0x70 [ 687.566893] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 687.571859] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 687.577059] RIP: 0033:0x4573d7 [ 687.580374] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 687.599398] RSP: 002b:00007f9f77a49a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 687.607125] RAX: ffffffffffffffda RBX: 00000000200002d0 RCX: 00000000004573d7 [ 687.614397] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 687.621667] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 687.629091] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 687.636434] R13: 0000000000000000 R14: 00000000004d8320 R15: 0000000000000003 21:58:45 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'deb.g_want_extra_isize'}}]}) 21:58:45 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660, 0x6000000], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:45 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:45 executing program 3 (fault-call:0 fault-nth:9): syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:58:45 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f00000015c0)=[{&(0x7f0000000500)="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", 0x163, 0x7a}]) 21:58:45 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x85) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000001c0)={{{@in6=@loopback, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f00000002c0)=0xe8) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x4000, &(0x7f0000000340)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303030352c6d6f64653d30303030343032303030303030303030303030303030302c6d6f64653d30303030303030303030303030303030303030303030352c6d6f64653d30303030303030303030303030303030303030303030302c6d6f64653d30303030303030303030303030303030303030303030372c66756e633d504154485f434845434b2c7065726d69745f646972656374696f2c66736e616d653d00f83f00802c6f626a5f757365723d627066002c657569643e", @ANYRESDEC=r0, @ANYBLOB="2c7375626a5f747970003d70707030dd13140cebb7f25d"]) openat$dsp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dsp\x00', 0x0, 0x0) truncate(&(0x7f0000000440)='./file0/file0\x00', 0x20) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)) 21:58:45 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660, 0x1100], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 687.850152] FAULT_INJECTION: forcing a failure. [ 687.850152] name failslab, interval 1, probability 0, space 0, times 0 [ 687.888896] CPU: 1 PID: 5476 Comm: syz-executor3 Not tainted 4.19.0+ #92 21:58:45 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 687.895812] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 687.905189] Call Trace: [ 687.907835] dump_stack+0x244/0x39d [ 687.911504] ? dump_stack_print_info.cold.1+0x20/0x20 [ 687.916753] should_fail.cold.4+0xa/0x17 [ 687.920875] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 687.926005] ? pick_next_task_fair+0xa05/0x1b30 [ 687.930703] ? rcu_read_lock_sched_held+0x14f/0x180 [ 687.935759] ? zap_class+0x640/0x640 [ 687.939531] ? print_usage_bug+0xc0/0xc0 [ 687.943626] ? find_held_lock+0x36/0x1c0 21:58:45 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:45 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660, 0x500], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 687.947720] ? __lock_is_held+0xb5/0x140 [ 687.951821] ? follow_trans_huge_pmd+0x1108/0x11a0 [ 687.956809] ? reweight_entity+0x10f0/0x10f0 [ 687.961365] ? perf_trace_sched_process_exec+0x860/0x860 [ 687.966859] __should_failslab+0x124/0x180 [ 687.971127] should_failslab+0x9/0x14 [ 687.974956] kmem_cache_alloc+0x2be/0x730 [ 687.979131] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 687.984184] __kernfs_new_node+0x127/0x8d0 [ 687.988453] ? trace_hardirqs_off_caller+0x310/0x310 [ 687.993584] ? kernfs_dop_revalidate+0x3c0/0x3c0 21:58:45 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 687.998377] ? _raw_spin_unlock_irq+0x60/0x80 [ 688.002896] ? __schedule+0x168a/0x21d0 [ 688.006903] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 688.012036] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 688.017168] ? zap_class+0x640/0x640 [ 688.020909] ? zap_class+0x640/0x640 [ 688.024651] ? enqueue_task_fair+0x24d/0xa50 [ 688.029089] ? find_held_lock+0x36/0x1c0 [ 688.033188] kernfs_new_node+0x95/0x120 [ 688.037197] kernfs_create_dir_ns+0x4d/0x160 [ 688.041643] internal_create_group+0x5fc/0xd80 [ 688.046271] ? remove_files.isra.1+0x190/0x190 21:58:45 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 688.050882] ? up_write+0x7b/0x220 [ 688.054450] ? down_write_nested+0x130/0x130 [ 688.058889] ? down_read+0x120/0x120 [ 688.062649] sysfs_create_group+0x1f/0x30 [ 688.066838] lo_ioctl+0x1307/0x1d60 [ 688.070500] ? lo_rw_aio+0x1ef0/0x1ef0 [ 688.074423] blkdev_ioctl+0x98e/0x21b0 [ 688.078352] ? blkpg_ioctl+0xc10/0xc10 [ 688.082265] ? lock_downgrade+0x900/0x900 [ 688.086445] ? check_preemption_disabled+0x48/0x280 [ 688.091507] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 688.096476] ? kasan_check_read+0x11/0x20 [ 688.100655] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 688.105961] ? rcu_softirq_qs+0x20/0x20 [ 688.109970] ? __fget+0x4d1/0x740 [ 688.113457] ? ksys_dup3+0x680/0x680 [ 688.117207] block_ioctl+0xee/0x130 [ 688.120860] ? blkdev_fallocate+0x400/0x400 [ 688.125277] do_vfs_ioctl+0x1de/0x1720 [ 688.129201] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 688.134844] ? ioctl_preallocate+0x300/0x300 [ 688.139256] ? memset+0x31/0x40 [ 688.142551] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 688.148103] ? smack_file_ioctl+0x210/0x3c0 [ 688.152448] ? fget_raw+0x20/0x20 [ 688.155915] ? smack_file_lock+0x2e0/0x2e0 [ 688.160154] ? rcu_read_lock_sched_held+0x14f/0x180 [ 688.165187] ? do_syscall_64+0x9a/0x820 [ 688.169173] ? do_syscall_64+0x9a/0x820 [ 688.173183] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 688.178745] ? security_file_ioctl+0x94/0xc0 [ 688.183195] ksys_ioctl+0xa9/0xd0 [ 688.186680] __x64_sys_ioctl+0x73/0xb0 [ 688.190791] do_syscall_64+0x1b9/0x820 [ 688.194689] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 688.200061] ? syscall_return_slowpath+0x5e0/0x5e0 [ 688.205053] ? trace_hardirqs_on_caller+0x310/0x310 [ 688.210078] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 688.215113] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 688.221827] ? __switch_to_asm+0x40/0x70 [ 688.225967] ? __switch_to_asm+0x34/0x70 [ 688.230242] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 688.235094] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 688.240291] RIP: 0033:0x4573d7 [ 688.243498] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 688.262405] RSP: 002b:00007f9f77a49a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 688.270230] RAX: ffffffffffffffda RBX: 00000000200002d0 RCX: 00000000004573d7 [ 688.277503] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 688.284801] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 688.292101] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 688.299455] R13: 0000000000000000 R14: 00000000004d8320 R15: 0000000000000003 [ 688.412551] EXT4-fs: 11 callbacks suppressed [ 688.412565] EXT4-fs (sda1): Unrecognized mount option "deb.g_want_extra_isize=0x0000000000000000" or missing value [ 688.460975] EXT4-fs (sda1): re-mounted. Opts: [ 688.510099] EXT4-fs (sda1): re-mounted. Opts: [ 688.514983] EXT4-fs (sda1): Unrecognized mount option "deb.g_want_extra_isize=0x0000000000000000" or missing value 21:58:45 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debpg_want_extra_isize'}}]}) 21:58:45 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:45 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660, 0x600000000000000], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:45 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f00000015c0)=[{&(0x7f0000000500)="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", 0x180, 0x7a}]) 21:58:45 executing program 3 (fault-call:0 fault-nth:10): syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:58:45 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000080)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x6, 0x0, &(0x7f0000000700), 0x1100020, &(0x7f0000000300)) [ 688.659460] FAULT_INJECTION: forcing a failure. [ 688.659460] name failslab, interval 1, probability 0, space 0, times 0 [ 688.671245] CPU: 0 PID: 5518 Comm: syz-executor3 Not tainted 4.19.0+ #92 [ 688.678111] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 688.687480] Call Trace: [ 688.690098] dump_stack+0x244/0x39d [ 688.693786] ? dump_stack_print_info.cold.1+0x20/0x20 [ 688.699115] should_fail.cold.4+0xa/0x17 [ 688.703201] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 688.708329] ? pick_next_task_fair+0xa05/0x1b30 [ 688.713032] ? rcu_read_lock_sched_held+0x14f/0x180 [ 688.718085] ? zap_class+0x640/0x640 [ 688.718105] ? print_usage_bug+0xc0/0xc0 [ 688.718129] ? find_held_lock+0x36/0x1c0 [ 688.725929] ? __lock_is_held+0xb5/0x140 [ 688.725947] ? nfc_genl_dep_link_up_event+0x348/0x5a0 [ 688.725978] ? reweight_entity+0x10f0/0x10f0 [ 688.743718] ? perf_trace_sched_process_exec+0x860/0x860 [ 688.749203] __should_failslab+0x124/0x180 [ 688.753468] should_failslab+0x9/0x14 [ 688.757307] kmem_cache_alloc+0x2be/0x730 [ 688.761484] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 688.766528] __kernfs_new_node+0x127/0x8d0 [ 688.770814] ? trace_hardirqs_off_caller+0x310/0x310 [ 688.775948] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 688.780743] ? _raw_spin_unlock_irq+0x60/0x80 [ 688.785285] ? __schedule+0x168a/0x21d0 [ 688.789292] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 688.794417] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 688.799547] ? zap_class+0x640/0x640 [ 688.803285] ? zap_class+0x640/0x640 [ 688.807022] ? enqueue_task_fair+0x24d/0xa50 [ 688.811580] ? find_held_lock+0x36/0x1c0 [ 688.815676] kernfs_new_node+0x95/0x120 [ 688.819676] kernfs_create_dir_ns+0x4d/0x160 [ 688.824114] internal_create_group+0x5fc/0xd80 [ 688.828735] ? remove_files.isra.1+0x190/0x190 [ 688.833361] ? up_write+0x7b/0x220 [ 688.836924] ? down_write_nested+0x130/0x130 [ 688.841355] ? down_read+0x120/0x120 [ 688.845108] sysfs_create_group+0x1f/0x30 [ 688.849280] lo_ioctl+0x1307/0x1d60 [ 688.852943] ? lo_rw_aio+0x1ef0/0x1ef0 [ 688.856857] blkdev_ioctl+0x98e/0x21b0 [ 688.860793] ? blkpg_ioctl+0xc10/0xc10 [ 688.864707] ? lock_downgrade+0x900/0x900 [ 688.868884] ? check_preemption_disabled+0x48/0x280 [ 688.873927] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 688.878879] ? kasan_check_read+0x11/0x20 [ 688.883053] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 688.888350] ? rcu_softirq_qs+0x20/0x20 [ 688.892356] ? __fget+0x4d1/0x740 [ 688.895841] ? ksys_dup3+0x680/0x680 [ 688.899588] block_ioctl+0xee/0x130 [ 688.903236] ? blkdev_fallocate+0x400/0x400 [ 688.907581] do_vfs_ioctl+0x1de/0x1720 [ 688.911502] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 688.917067] ? ioctl_preallocate+0x300/0x300 [ 688.921502] ? memset+0x31/0x40 [ 688.924824] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 688.930390] ? smack_file_ioctl+0x210/0x3c0 [ 688.934733] ? fget_raw+0x20/0x20 [ 688.939504] ? smack_file_lock+0x2e0/0x2e0 [ 688.943763] ? rcu_read_lock_sched_held+0x14f/0x180 [ 688.948927] ? do_syscall_64+0x9a/0x820 [ 688.952925] ? do_syscall_64+0x9a/0x820 [ 688.956930] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 688.962496] ? security_file_ioctl+0x94/0xc0 [ 688.966946] ksys_ioctl+0xa9/0xd0 [ 688.970443] __x64_sys_ioctl+0x73/0xb0 [ 688.974359] do_syscall_64+0x1b9/0x820 [ 688.978273] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 688.983796] ? syscall_return_slowpath+0x5e0/0x5e0 [ 688.988752] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 688.993649] ? trace_hardirqs_on_caller+0x310/0x310 [ 688.998807] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 689.003855] ? prepare_exit_to_usermode+0x291/0x3b0 [ 689.008903] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 689.013807] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 689.019017] RIP: 0033:0x4573d7 [ 689.022238] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 689.041161] RSP: 002b:00007f9f77a49a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 689.049036] RAX: ffffffffffffffda RBX: 00000000200002d0 RCX: 00000000004573d7 21:58:46 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660, 0x78020000], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:46 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 689.056327] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 689.063615] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 689.070910] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 689.078273] R13: 0000000000000000 R14: 00000000004d8320 R15: 0000000000000003 21:58:46 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f00000015c0)=[{&(0x7f0000000500)="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", 0x180, 0x7a}]) 21:58:46 executing program 3 (fault-call:0 fault-nth:11): syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) [ 689.156750] EXT4-fs (sda1): re-mounted. Opts: 21:58:46 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660, 0x3f00000000000000], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:46 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 689.225427] EXT4-fs (sda1): re-mounted. Opts: [ 689.240979] EXT4-fs (sda1): Unrecognized mount option "debpg_want_extra_isize=0x0000000000000000" or missing value [ 689.289206] FAULT_INJECTION: forcing a failure. [ 689.289206] name failslab, interval 1, probability 0, space 0, times 0 [ 689.337442] CPU: 1 PID: 5541 Comm: syz-executor3 Not tainted 4.19.0+ #92 [ 689.344328] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 689.344336] Call Trace: [ 689.344362] dump_stack+0x244/0x39d [ 689.344389] ? dump_stack_print_info.cold.1+0x20/0x20 [ 689.344427] should_fail.cold.4+0xa/0x17 [ 689.356449] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 689.356472] ? lock_release+0xa00/0xa00 [ 689.356489] ? perf_trace_sched_process_exec+0x860/0x860 [ 689.356514] ? zap_class+0x640/0x640 [ 689.356548] ? find_held_lock+0x36/0x1c0 [ 689.365603] ? __lock_is_held+0xb5/0x140 [ 689.365637] ? perf_trace_sched_process_exec+0x860/0x860 [ 689.365652] ? kernfs_activate+0x21a/0x2c0 [ 689.365679] __should_failslab+0x124/0x180 [ 689.374853] should_failslab+0x9/0x14 [ 689.374872] kmem_cache_alloc+0x2be/0x730 [ 689.374890] ? lock_downgrade+0x900/0x900 [ 689.374912] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 689.374933] __kernfs_new_node+0x127/0x8d0 [ 689.431818] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 689.436689] ? zap_class+0x640/0x640 [ 689.440436] ? __lock_is_held+0xb5/0x140 [ 689.444591] ? wait_for_completion+0x8a0/0x8a0 [ 689.449210] ? mutex_unlock+0xd/0x10 [ 689.452948] ? kernfs_activate+0x21a/0x2c0 [ 689.457204] ? kernfs_walk_and_get_ns+0x340/0x340 [ 689.462073] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 689.467828] ? kernfs_link_sibling+0x1d2/0x3b0 [ 689.472439] kernfs_new_node+0x95/0x120 [ 689.476439] __kernfs_create_file+0x5a/0x340 [ 689.480878] sysfs_add_file_mode_ns+0x222/0x530 [ 689.485591] internal_create_group+0x3df/0xd80 [ 689.490379] ? remove_files.isra.1+0x190/0x190 [ 689.494983] ? up_write+0x7b/0x220 [ 689.498551] ? down_write_nested+0x130/0x130 [ 689.502985] ? down_read+0x120/0x120 [ 689.506740] sysfs_create_group+0x1f/0x30 [ 689.510936] lo_ioctl+0x1307/0x1d60 [ 689.514599] ? lo_rw_aio+0x1ef0/0x1ef0 [ 689.518512] blkdev_ioctl+0x98e/0x21b0 [ 689.522429] ? blkpg_ioctl+0xc10/0xc10 [ 689.526335] ? lock_downgrade+0x900/0x900 [ 689.530534] ? check_preemption_disabled+0x48/0x280 [ 689.535580] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 689.540536] ? kasan_check_read+0x11/0x20 [ 689.544708] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 689.550002] ? rcu_softirq_qs+0x20/0x20 [ 689.554013] ? __fget+0x4d1/0x740 [ 689.557500] ? ksys_dup3+0x680/0x680 [ 689.561321] block_ioctl+0xee/0x130 [ 689.564978] ? blkdev_fallocate+0x400/0x400 [ 689.569324] do_vfs_ioctl+0x1de/0x1720 [ 689.573242] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 689.578824] ? ioctl_preallocate+0x300/0x300 [ 689.583324] ? memset+0x31/0x40 [ 689.586632] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 689.592256] ? smack_file_ioctl+0x210/0x3c0 [ 689.596597] ? fget_raw+0x20/0x20 [ 689.600076] ? smack_file_lock+0x2e0/0x2e0 [ 689.604335] ? rcu_read_lock_sched_held+0x14f/0x180 [ 689.609385] ? do_syscall_64+0x9a/0x820 [ 689.613379] ? do_syscall_64+0x9a/0x820 [ 689.617379] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 689.622943] ? security_file_ioctl+0x94/0xc0 [ 689.627381] ksys_ioctl+0xa9/0xd0 [ 689.630863] __x64_sys_ioctl+0x73/0xb0 [ 689.634801] do_syscall_64+0x1b9/0x820 [ 689.638715] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 689.644111] ? syscall_return_slowpath+0x5e0/0x5e0 [ 689.649060] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 689.653935] ? trace_hardirqs_on_caller+0x310/0x310 [ 689.659040] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 689.664197] ? prepare_exit_to_usermode+0x291/0x3b0 [ 689.669271] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 689.674148] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 689.679381] RIP: 0033:0x4573d7 [ 689.682611] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 689.701537] RSP: 002b:00007f9f77a49a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 689.709330] RAX: ffffffffffffffda RBX: 00000000200002d0 RCX: 00000000004573d7 [ 689.716618] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 689.723903] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 689.731188] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 689.738474] R13: 0000000000000000 R14: 00000000004d8320 R15: 0000000000000003 [ 689.775301] EXT4-fs (sda1): Unrecognized mount option "debpg_want_extra_isize=0x0000000000000000" or missing value 21:58:47 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'deb%g_want_extra_isize'}}]}) 21:58:47 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f00000015c0)=[{&(0x7f0000000500)="f10457d357850ba96b3177c5432bf4d57c0df1e6e18ce27b33d45d2e44ea456be44eda49bb10e571862513b61f102eed99409fc67556483b021260a6f33dc13da1d50ddc83aa3a84a6f07efb3392e1a070fc93147c678e2c4902fd60a9f8022b1cd2f6cce4395660373a5d44cfb97743fa1936d10e0eca652e427449e026f4fc95277e2947ff7c23e8a9600b8d1f68338c57cab04985c591388803e6596d8bae0bd479bae6846d61e8fefe2551fc2e9859203159a172db93cf6c8c8f5905d602d33c5960cd9ee8105d2fa64f2dff6e70f20c95ec33e98d0588f3bfa4cf0f4b7110c203c2306b98360dc46505616c680611e12dff271a9918a3b8461ba1050bbbd417dbd8cfebe2d0098c84c96088389038c29083e639aca0781ec95d404510b103a582c1c888479ffe336ebd0ba87a1bf3d7420300fdf869e295b0e4e29d9700c930e48d202580b2acd201d0c54e13c7476a888fe6e77d03bb3caf8c17fde8efbf73696eee07a82dbe846b77433a1ecfa75200e5fa41dedc26dcd09bdcf7293e", 0x180, 0x7a}]) 21:58:47 executing program 1: mkdir(&(0x7f0000000080)='./file1\x00', 0x80) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000040)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)) 21:58:47 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660, 0x88000000], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:47 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:47 executing program 3 (fault-call:0 fault-nth:12): syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) [ 689.944225] FAULT_INJECTION: forcing a failure. [ 689.944225] name failslab, interval 1, probability 0, space 0, times 0 [ 689.973456] CPU: 1 PID: 5554 Comm: syz-executor3 Not tainted 4.19.0+ #92 [ 689.980363] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 689.989808] Call Trace: [ 689.989837] dump_stack+0x244/0x39d [ 689.989862] ? dump_stack_print_info.cold.1+0x20/0x20 [ 689.989904] should_fail.cold.4+0xa/0x17 [ 689.996127] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 689.996150] ? lock_release+0xa00/0xa00 [ 689.996166] ? perf_trace_sched_process_exec+0x860/0x860 [ 689.996190] ? zap_class+0x640/0x640 [ 690.023705] ? find_held_lock+0x36/0x1c0 [ 690.027812] ? __lock_is_held+0xb5/0x140 [ 690.031920] ? perf_trace_sched_process_exec+0x860/0x860 [ 690.037396] ? kernfs_activate+0x21a/0x2c0 [ 690.041663] __should_failslab+0x124/0x180 [ 690.045922] should_failslab+0x9/0x14 [ 690.049743] kmem_cache_alloc+0x2be/0x730 [ 690.053940] ? lock_downgrade+0x900/0x900 [ 690.058112] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 690.063158] __kernfs_new_node+0x127/0x8d0 [ 690.067419] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 690.072203] ? zap_class+0x640/0x640 [ 690.075951] ? __lock_is_held+0xb5/0x140 [ 690.080034] ? wait_for_completion+0x8a0/0x8a0 [ 690.084652] ? mutex_unlock+0xd/0x10 [ 690.088387] ? kernfs_activate+0x21a/0x2c0 [ 690.092644] ? kernfs_walk_and_get_ns+0x340/0x340 [ 690.097513] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 690.103165] ? kernfs_link_sibling+0x1d2/0x3b0 [ 690.107800] kernfs_new_node+0x95/0x120 [ 690.111828] __kernfs_create_file+0x5a/0x340 [ 690.116266] sysfs_add_file_mode_ns+0x222/0x530 [ 690.120966] internal_create_group+0x3df/0xd80 [ 690.125590] ? remove_files.isra.1+0x190/0x190 [ 690.130189] ? up_write+0x7b/0x220 [ 690.133749] ? down_write_nested+0x130/0x130 [ 690.138313] ? down_read+0x120/0x120 [ 690.142071] sysfs_create_group+0x1f/0x30 [ 690.146245] lo_ioctl+0x1307/0x1d60 [ 690.149904] ? lo_rw_aio+0x1ef0/0x1ef0 [ 690.153833] blkdev_ioctl+0x98e/0x21b0 [ 690.157742] ? blkpg_ioctl+0xc10/0xc10 [ 690.161673] ? lock_downgrade+0x900/0x900 [ 690.165846] ? check_preemption_disabled+0x48/0x280 [ 690.170890] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 690.175844] ? kasan_check_read+0x11/0x20 [ 690.180010] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 690.185305] ? rcu_softirq_qs+0x20/0x20 [ 690.189310] ? __fget+0x4d1/0x740 [ 690.192825] ? ksys_dup3+0x680/0x680 [ 690.196579] block_ioctl+0xee/0x130 [ 690.200226] ? blkdev_fallocate+0x400/0x400 [ 690.204571] do_vfs_ioctl+0x1de/0x1720 [ 690.208488] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 690.214050] ? ioctl_preallocate+0x300/0x300 [ 690.218486] ? memset+0x31/0x40 [ 690.221812] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 690.227378] ? smack_file_ioctl+0x210/0x3c0 [ 690.232119] ? fget_raw+0x20/0x20 [ 690.235597] ? smack_file_lock+0x2e0/0x2e0 [ 690.239855] ? rcu_read_lock_sched_held+0x14f/0x180 [ 690.244906] ? do_syscall_64+0x9a/0x820 [ 690.248910] ? do_syscall_64+0x9a/0x820 [ 690.252911] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 690.258470] ? security_file_ioctl+0x94/0xc0 [ 690.262905] ksys_ioctl+0xa9/0xd0 [ 690.266387] __x64_sys_ioctl+0x73/0xb0 [ 690.270303] do_syscall_64+0x1b9/0x820 [ 690.274219] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 690.279607] ? syscall_return_slowpath+0x5e0/0x5e0 [ 690.284562] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 690.289433] ? trace_hardirqs_on_caller+0x310/0x310 [ 690.294469] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 690.299506] ? prepare_exit_to_usermode+0x291/0x3b0 [ 690.304562] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 690.309441] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 690.314646] RIP: 0033:0x4573d7 [ 690.317858] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 690.336804] RSP: 002b:00007f9f77a49a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 21:58:47 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:47 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660, 0x40000000], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 690.344543] RAX: ffffffffffffffda RBX: 00000000200002d0 RCX: 00000000004573d7 [ 690.351836] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 690.359121] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 690.366501] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 690.373813] R13: 0000000000000000 R14: 00000000004d8320 R15: 0000000000000003 21:58:47 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f00000015c0)=[{&(0x7f0000000500)="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", 0x18f, 0x7a}]) 21:58:47 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:47 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)=ANY=[@ANYBLOB=' ']) 21:58:47 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660, 0x700], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 690.500312] EXT4-fs (sda1): Unrecognized mount option "deb%g_want_extra_isize=0x0000000000000000" or missing value [ 690.560475] Dev loop4: unable to read RDB block 1 [ 690.565582] loop4: unable to read partition table [ 690.575846] loop4: partition table beyond EOD, truncated [ 690.582729] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 690.599570] EXT4-fs (sda1): Unrecognized mount option " " or missing value 21:58:48 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'deblg_want_extra_isize'}}]}) 21:58:48 executing program 3 (fault-call:0 fault-nth:13): syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:58:48 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:48 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660, 0x3f00], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:48 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f00000015c0)=[{&(0x7f0000000500)="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", 0x181, 0x7a}]) [ 690.795440] FAULT_INJECTION: forcing a failure. [ 690.795440] name failslab, interval 1, probability 0, space 0, times 0 [ 690.816442] CPU: 1 PID: 5593 Comm: syz-executor3 Not tainted 4.19.0+ #92 [ 690.823316] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 690.832686] Call Trace: [ 690.835300] dump_stack+0x244/0x39d [ 690.838962] ? dump_stack_print_info.cold.1+0x20/0x20 [ 690.844202] should_fail.cold.4+0xa/0x17 [ 690.848292] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 690.848316] ? lock_release+0xa00/0xa00 [ 690.848332] ? perf_trace_sched_process_exec+0x860/0x860 [ 690.848355] ? zap_class+0x640/0x640 [ 690.857457] ? find_held_lock+0x36/0x1c0 [ 690.857479] ? __lock_is_held+0xb5/0x140 [ 690.857509] ? perf_trace_sched_process_exec+0x860/0x860 [ 690.880268] ? kernfs_activate+0x21a/0x2c0 [ 690.884541] __should_failslab+0x124/0x180 [ 690.888825] should_failslab+0x9/0x14 [ 690.892648] kmem_cache_alloc+0x2be/0x730 [ 690.896838] ? lock_downgrade+0x900/0x900 [ 690.901014] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 690.906072] __kernfs_new_node+0x127/0x8d0 [ 690.910338] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 690.915119] ? zap_class+0x640/0x640 [ 690.918868] ? __lock_is_held+0xb5/0x140 [ 690.922949] ? wait_for_completion+0x8a0/0x8a0 [ 690.927567] ? mutex_unlock+0xd/0x10 [ 690.931302] ? kernfs_activate+0x21a/0x2c0 [ 690.935563] ? kernfs_walk_and_get_ns+0x340/0x340 [ 690.940431] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 690.945989] ? kernfs_link_sibling+0x1d2/0x3b0 [ 690.950596] kernfs_new_node+0x95/0x120 [ 690.954601] __kernfs_create_file+0x5a/0x340 [ 690.959035] sysfs_add_file_mode_ns+0x222/0x530 [ 690.963738] internal_create_group+0x3df/0xd80 [ 690.968380] ? remove_files.isra.1+0x190/0x190 [ 690.972983] ? up_write+0x7b/0x220 [ 690.976548] ? down_write_nested+0x130/0x130 [ 690.980979] ? down_read+0x120/0x120 [ 690.984731] sysfs_create_group+0x1f/0x30 [ 690.988928] lo_ioctl+0x1307/0x1d60 [ 690.992585] ? lo_rw_aio+0x1ef0/0x1ef0 [ 690.996501] blkdev_ioctl+0x98e/0x21b0 [ 691.000420] ? blkpg_ioctl+0xc10/0xc10 [ 691.004329] ? lock_downgrade+0x900/0x900 [ 691.008499] ? check_preemption_disabled+0x48/0x280 [ 691.013555] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 691.018510] ? kasan_check_read+0x11/0x20 [ 691.022682] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 691.027981] ? rcu_softirq_qs+0x20/0x20 [ 691.031989] ? __fget+0x4d1/0x740 [ 691.035472] ? ksys_dup3+0x680/0x680 [ 691.039223] block_ioctl+0xee/0x130 [ 691.042872] ? blkdev_fallocate+0x400/0x400 [ 691.047218] do_vfs_ioctl+0x1de/0x1720 [ 691.051131] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 691.056695] ? ioctl_preallocate+0x300/0x300 [ 691.061130] ? memset+0x31/0x40 [ 691.064438] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 691.069999] ? smack_file_ioctl+0x210/0x3c0 [ 691.074357] ? fget_raw+0x20/0x20 [ 691.077851] ? smack_file_lock+0x2e0/0x2e0 [ 691.082109] ? rcu_read_lock_sched_held+0x14f/0x180 [ 691.087157] ? do_syscall_64+0x9a/0x820 [ 691.091160] ? do_syscall_64+0x9a/0x820 [ 691.095165] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 691.100721] ? security_file_ioctl+0x94/0xc0 [ 691.105152] ksys_ioctl+0xa9/0xd0 [ 691.108629] __x64_sys_ioctl+0x73/0xb0 [ 691.112547] do_syscall_64+0x1b9/0x820 [ 691.116460] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 691.121916] ? syscall_return_slowpath+0x5e0/0x5e0 [ 691.126961] ? trace_hardirqs_on_caller+0x310/0x310 [ 691.132002] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 691.137058] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 691.143752] ? __switch_to_asm+0x40/0x70 [ 691.147859] ? __switch_to_asm+0x34/0x70 [ 691.151949] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 691.156845] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 691.162056] RIP: 0033:0x4573d7 [ 691.165268] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 691.184187] RSP: 002b:00007f9f77a49a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 21:58:48 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:48 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)) fstat(0xffffffffffffff9c, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = getpgrp(0x0) r2 = syz_open_procfs(r1, &(0x7f0000001840)='net\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001700)='memory.events\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000001640)='./file1\x00', &(0x7f0000001680)='9p\x00', 0x448, &(0x7f0000001740)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@posixacl='posixacl'}, {@posixacl='posixacl'}, {@loose='loose'}, {@cache_fscache='cache=fscache'}], [{@obj_type={'obj_type', 0x3d, 'securitycgroup'}}, {@uid_eq={'uid', 0x3d, r0}}]}}) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000001800)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x5, &(0x7f00000015c0)=[{&(0x7f00000003c0)="702c55a94062f026c1c3050d3ed1be3d118d7353e0afca891c223435c9bfeee37f1b0fd2a0fbe57c4c7ed489209add49946075b45917aa1bc9fdc88ae029cc0fb6e50ad3d74444ce69ef2ba7b06137f8add8b08edea5484da372d8e12302d21c53467bf34230b08def12f7afb22de0387b80df79c1d173acbc1c95170ac7e265af3e0ac638591e3a2de0b7c0d1c66034befbb7257bdd80ec86c2deeb7059764afdaa0c07325bed0e00b1da16dc876b919ca4dec000ea8137", 0xb8, 0x7}, {&(0x7f0000000480)="e531c5dc51637b20be6a49992a486e89f7104ec58b0587d5fbb9e853c97192fc542ee7d40dcc6d3e5882304ebd6059714350e404ab5abdbb81457d82beb61589a06c027a2b213f5b56556abc133608c0189accde4f346baaa1d71f24f1df6c75ade36ae4779c334c10273028669f99d150fd79b497e173e5d6cfba42e1049cea693b4f97da8877361ca87e2a8f4ff320109062dbb294eff0124707b363ecac6b9acce420e2ab1a63ab79", 0xaa, 0x1ff}, {&(0x7f0000000540)="cf0b78faedcf56f7da64464dbe349fd41db7e66af5f056c640678bbedfe919efbffe68b054c246e806228847d7f2785ee9d49135bea4919acf2e3420a55c94488397b354c57faf89027c9e5b0da64b95fec045ba9c8fc209c8d0543522d9ec6503404542b6ea6fda0713d8f3af8c8f0263c578e4d76b2789bfb92b535f6257c86e23c4aa6c2fe2c06ced18ceace51bc053a18c54e6ff5bd258f226a461cda1e95aa186b27e9b3e1f473cbcd5b6f63b830fabab8c84e05c153772b327c841f1272fcc75c09d73ac4e8abbed442a9dc95a3f2fb6cd5a82c825c600a899a6a4e43163ad51af876182fd840cfce0ab903de50b1b148515b1d64c15f135abea7c273f37019275a37fcdae3dd44e791282d8e33170065d763a4d2b81fbfe23975395158977cf9085bfee1e50219157ce96ce23c29642ad7fbdb27290b684bf3f84ca28edc87ada836116697cf231063cf9a3103cc6c764e2b491a638b5aa7e9489272a0ebf92b96658ac5821d298379ad118f62c3c9a647ce3ca279bd9d938276d874728dea3f9d05e2e05742f13a29d5d0d63cfa07fb1b96de1bdd64974845f4889f981538c0d8cd6ae2df56728d08a93927d3abd1ca671e9e4d84990aa45cdc645010f143280873dc8afdfa804af7cf629c635fc39b4181fa4fa0ceb145f877a82cd069aec714f9fff4ae37c16323a12a75e5d84edad05dccb3f11bb15bdf9455c1b353f87bf26edd0fb3ef55daa58cde70cb7d435de85caaff615dc6e1fc910fc8c7a12e3eb3445f48f0c8597e98dd3a22cef11ef06ad2d3d18aea014b1685ef8aad5578633c0c6c565d57c62ef590c68eb0b98e2dd86fc6921f8062234c31158721bb5c0b53339ab6c0b7f0269b3335e44e2f42988a9bc1fecc0ac917820b4c0d7f595edef26c3cbd0492320b12aa0cc711cb914619d62f8fe34a950b9ff32a690fa83f5443068f6e43975a5822aaade88bac70d289c4fe076fe4a9c4baa76f895be7f00d291e1c4eceb21845ad25cc9a8c687f90aebaec688690bfb6412d4be97eafaa6a6e3fadf10e824b9c144a23bd56f92efd270aa72583d0a2177ffdbfb0100e3376b4844fc137bce90cbb435c96cc7e0cb0b9f8303086df21d25eb4af517d82d95d25232183ab1022098bd936a3cbc31e03d6efc6aba90b51f3d8d710506d940c17667302bc225ab81bf41a64404c6eadc9be49613da560a274c6c814ca0ec9d0d855c53aba6f5478035b69cf489e2211336f081642c670aa299bc4849e7bbb285ae4797da6f0d51045f0eefd7836e37426cadd9355b87cee26035f4c8b939969497c3b4cb74f065b08db2a342e357c2e7d8f9c20f2f99e4f4390c51d5ec484c80748048a702499681371cc26d25d258e47cb65b085fc5c559abc75aa4f1876981c9681ab43bb77dad99c120378e3769ac6013c5b8b6595ca81909cd9cbd29fb9f7ba91ed867c065daac0a915936bf1c8aa9552c1c45a326135d92f936d880fa6053486833e2b071a2991c14112b1311e1adf2f62d2425c662a8123f6070d6a9a32fdd6d474e37a6e7594f34cf628bc6edc753336f3d7d3b687a059ec17a434da90389b59152cfb4b5801a538d0375227c934f0c4ac08263664945b3296f9bc60d477ce41171b2fef3306d5f7438f9abb932dc85b0891022036dbe0799addaf46b0233723e0bd8eabd3c6c9edfd3521b731a942cd6c47b139a749e0a155d9817781b11a52e1aae9c4da76d6a96b8e171d529309f3567aedb0fa2ebdd9a62babf480b3f822c5282e576844b94cbc0ab9bcb1f2b6118e8e50736adcb68b132122daeddc809a9f12bffdfd3c3e855568537233ccb8a95d6b15cb08523032718b6bfef1b8a191807672780e6ba5ca1fc607a044c020ef09dedacd5b56ddbacfb25b9b7c4a8d1071549de87a64b4e15d003c67c13d94fc68458591ee6354b35cf45c232360b4f46ea0b0e071cafcf0a895a0f5849868cbdfe45ecdaa1cb0f6a66300af4cec56746fcc3a2fc24dcafefe5a07b037b44e79fa126d13b80a172654e79ba2121620848d63491e24413030b6098b7905098474d951600372abdb83fcc7060a0d06e3fd3cb0bfb4850109293f87fab4e689c75d19624513609efb652526a67201cc10b0f43b9b33b1e91c360089afc2cf5e475ddb4206546ab79144d05563f328fd3f7d6094e9594e8500e4b08f5fa05a89fd73942d62038eb2599d49da305aba485738cdf6d3394cd489028f9719a3ba5779278ddccc1d347415e4d2866e1436d66b64aa81a9b4697d5a56ae465d119cb8960886171f2f89174e70c3ecca3422632b1b686ea330629778f82f4ecd06b88622894ea111f6c9a15e5a88b83bb63a0b2ba6f6e70e786f6b6dc3a7d7712b8e6c5f28c6bc3254a0e643d20c68f44aae0e98b35d7480d2a8bb571d4f01567817554d146c5119c0ce8e3d57d4fae41ba19062a991d49cb81517d4bbcb4eeedf3f0dcb8ff552f72458d043a022fbf8cf3ca4dade684951781a36864ef4bfd2399fda272941f65bc20fa262b703bfd05ff60682380b69edea1b24a59e8a020ca59c6bca9bb511ce80a33f3666ce31f6e15164dcef2e7de23c7a656bc51b60f782fdb43badb3bba7cd580abe2f2e2b9b9a57b27a4e4fbc342451fdb0c1ff9c432006fce7f9f2faf504812ff86d87c1113afe2d53352b46051c6bb79c93d9175f0e00db0c88868e39bb9292c9ea738b4dbebf6a17b2ffc12910626f6b7e20905870865afa3575c1b469cf4d262d75f372fd661b8cc07d64a4bcb965d790e238c0b588430af0f8e3067f460d6ea411ab2489d8dc49bbc52d419b9bcb8ee5ed85f068b41a6c429de0a246d4c60e7b1edbfe3bbb95822b5c2f82b96223cf31fa3aac20837b1ec4f0d55d1982215cdb269061f45fc06ea48c9b1480134fd328c08f28d5598a7b5b896b6d5085f6b89255900c19ac8068f75c74d64391bc5875feb8f6ed6b28c1f651638142cb65da90ebc1d3095f1e652fe94eef59b67430ceb8cdfe5ae8af00558056009eebe3429117638f7c1d467a488edc5443998204a8ece7616bb4fb90e7528d4993deb554e67e196209465803da7f59c776801b9559818d3f08162891a59fcbde6d9478544e049ea49f56f1cfa4b71f761de729a3c463c3151fb60c2412e79c842dd3f7d69b8dac7ce318a36e636f9c236906bef58df2dea1ed0ffb55985cd7240b3cfa26079e194c2a73efb153399c6911b24299a6529ff77ca80ace48d78e8433afb5f5db9aee755a3f1c2e7c4981a805c4d94eabec8d0879499ce4cb05a66be30e5097b813a4aaca75cc241d30262382685ab283e1446f4b1778105e5a53992f23d55c8b61e778238236073a3fa2ebab7951b4df40ce0b72e37637b7263510fefc193b447e992df4616ad71bbf6e302bc39171cca324092be7d7e23f6a4d5d0772cff8c2eae3c8c2d091dabf6544c9b4093a8a6057759c6fcd7205b78617272f714e4ac3851d1796ba8076d151c3f0205b554a43da47cebb8c3eebb2afbc24073def872b95850e133d09415f58ecb8ffe5609bbfb2ecaa7dce153be4f19947b60bd0a97919309d615717ae555985f7867a98685697e699d2857e152724ee06385ed8601fa9c59d6d9834db4bbd8c3b3d998756e8146ba3fd9d3a1d275f4ff0ee03338d50471106d1558358b9f84731f7be8d36754e141d6ee4d20ec20dd26cf85866d5c15fdf801ae099936c8ddd1d0b42f30756b60e180b9ea10af80f8cbc6dccd63cdb6fa2c25b33422ab4424ac5343edf31fbd3976e877eecc660772cceb6228c23d75caf3db5ac40cf4ea43090feb3db35e77bd1c123fba2883c22e6978529d3cb76222a8eeb7e32a1ef067570dd93b20d038183780035cae5f7276262ec139df661b769c3dc0206876a8f03ffbd993288740306f0c30eddf093dca28087b53a5719c914f5e0d5c1efab3eb90fd7d1912a3af65838a389e8cd3e2127e38c0ecee67cf54c75e0c44522cc46aafbed51f29cd3d2cee54379bc47b2e841aa1f357022d484814ebca0fbad7cc382b8f7ad08b1803ef90e06dcab2bb5911c427ee1d494c49e8a4e814e9625386e76e42f3ae21d2861575c2825aee27afb0210bcb148cea2453b685717cd2d4479b78281471b721958682c0be8281d206aae3dc384c68755907e61d443a2f9f6869abf2700d500051bbbfa552dcc9f29923d6fb4c41056a7def4055369f2dcb7df1e9210e6dea31c342d9d6251a5f9d82427646cf6def68b9cbf77d97b0cd6a555679e367d856a9995b085abb3e435e1b7ec0b728d82057357dbc9c154e99d55e8a66699c23f9aae8f5584c362db8975b265e881162c54bf581deef333f0ca2f0211584ed14912b0c4b408022faff7c2786aa239cce92e3268e0d2125cbb0ba0af91318f7fc12fd5c13f0f0cd1dcd0af061b38c4d85671dac0cc5a552e8b00753b88a2bd075a3b2cbb385cc40f53cd5a2664af42f7aaf1c6fe0eb4e46d00fa9ff7364fba440830e31de929059134e47c947aa595b4c46bb93a6f49719f40d20567aca5ec50cb4bc579aded46a6526507d8f393079de6a66fe4abd6dafec1292d06af48b2a7db671cb5e6ff93f474fadc449b7c6ee713ba12cef678d0b48c6a4c22e95b933c38caca130b36f6b6417d5dd2141dc0c2a15cb748d37631ec8332da2248eabf4dc379815518ffc563dd15c04c703b806d9da5bcd90e30f2f614ca8feb23438c33233fe632c02e24ce29f7f191750d6becc7baca2a88800a08a71a86c678284b7c555d313959a3e0f04d5ee8433018e6c9d6dae8fab72fd4dec1781f6815f31a5602916823097fd44dfbc921ad2f04a18bfdc7207931192109222013f522520145948ed495d3522e90a4c3d2d1a145752a66ecb5745ca5d9f13ea1b80f5d72529e76549aa23876162cbaf66311ba1b97c0e58fea5fb83f2becdb8ac38ebd12dde9bb0f17b730c40c89d13c243f176bfa0b768dbc481e3e176111b97493d72cc37a593d127aeb026108c1acd4ea50bce069c39e5b4884df8a99b03803e8814b1ea5c2b678733328a3fe8bacc517820daedfa46b48855a6c69c83094e4dede81126f10a9d9ea767092a8efecfeb75f903a5b29aecca5aaa99931a4cf5d592fab8af14751408aa02443fe4e98c272c1eab5cd71d8b50cf31b08ca8da3378ea9c9eb1654856a4e7f8a92b058473a8540a70936bab1e98611fcb3d5081adb42f56dd5fa9eae8bd4713338d100f4988ea75c2eea63c6e7b567f5aee99c5573640330c5464a3cadf4736987a6d1edb7c338124aa900511566fc9d94a13d3031fbb47712e1fc124b12bc7c4e8fba35a1382df01a78eb720d167c25210d7471335a7ec1b0023c599b957113cf4c559e5def396cd197d6126771b46c91a1ead71471904d0dabb599080925db85dd0ec811078b88d8f55c329b144a0e176527a8a3745034a58a36b1112f74fe60deb31cd9805b3d7836192378d05357251f132c0fe802f2dc7315f3c1d7dc915fdaaef2a16166f06e2c4e0eaa1400e200c72128bb1b5d81287947032dde0cc88ed5d05defb7ba3a3778bc115e788f7270a78ae8226dc8ccea3c66a0f4a9a436cadddcf9ac4040514aada568d904647b4befeb97bb00a6e2d88447a4f0316948e5fc3874a8b38ce9fa9c21332765245848492ef145ddb652785d3a78741ee6d0db806a5edd50f065f310b92c8b7c2bed8560afce2ac39a3f35bf07b007d068aab5d5d14752d49ff3fc16eef1cdf84b4b150dfe0d9dab518bfb57ec70c4afe7da994c985df8de8d280de33b9ff8b04", 0x1000, 0x2}, {&(0x7f0000001540)="e1a5972940463e9dbe85697f8a14be7cae05a302c17e3093f6d9c5f729837a0a0ad1ea7c1732bae53d2b45ff6cbe81660a4f35ca001713c56b7573b1012a2eb22bc859630d2c671dd3ca4e08c63f6303d190c60cce48f88884a6680cf7ac52cce48cc99582295fbc4e9122b6", 0x6c}, {&(0x7f00000001c0)="813db33469f434d686fad2a52dbfbcb42920ee5e37928a8799a78be1a8cfb5ca05a5cfca1f35c6203739f7003427d78005", 0x31, 0x6}], 0x800000, &(0x7f0000000340)=ANY=[@ANYBLOB='iocharset=macgreek,uid=', @ANYRESHEX=r0, @ANYBLOB=',fowner=', @ANYRESDEC=r4, @ANYBLOB="2c646fe38d2c81016a5f747970653d000000"]) [ 691.191913] RAX: ffffffffffffffda RBX: 00000000200002d0 RCX: 00000000004573d7 [ 691.199195] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 691.206483] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 691.213787] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 691.221076] R13: 0000000000000000 R14: 00000000004d8320 R15: 0000000000000003 21:58:48 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660, 0x100000000000000], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:48 executing program 3 (fault-call:0 fault-nth:14): syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:58:48 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f00000015c0)=[{&(0x7f0000000500)="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", 0x181, 0x7a}]) 21:58:48 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 691.426070] FAULT_INJECTION: forcing a failure. [ 691.426070] name failslab, interval 1, probability 0, space 0, times 0 [ 691.438282] CPU: 0 PID: 5622 Comm: syz-executor3 Not tainted 4.19.0+ #92 [ 691.445151] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 691.445159] Call Trace: [ 691.445187] dump_stack+0x244/0x39d [ 691.445213] ? dump_stack_print_info.cold.1+0x20/0x20 [ 691.466036] should_fail.cold.4+0xa/0x17 [ 691.470133] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 691.475266] ? lock_release+0xa00/0xa00 [ 691.479268] ? perf_trace_sched_process_exec+0x860/0x860 [ 691.484751] ? zap_class+0x640/0x640 [ 691.488528] ? find_held_lock+0x36/0x1c0 [ 691.488551] ? __lock_is_held+0xb5/0x140 [ 691.488571] ? btrfs_destroy_inode+0x648/0x970 [ 691.501313] ? perf_trace_sched_process_exec+0x860/0x860 [ 691.506802] ? kernfs_activate+0x21a/0x2c0 [ 691.506833] __should_failslab+0x124/0x180 [ 691.506855] should_failslab+0x9/0x14 [ 691.515338] kmem_cache_alloc+0x2be/0x730 [ 691.515358] ? lock_downgrade+0x900/0x900 [ 691.515384] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 691.523335] __kernfs_new_node+0x127/0x8d0 [ 691.523359] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 691.523378] ? zap_class+0x640/0x640 [ 691.545285] ? __lock_is_held+0xb5/0x140 [ 691.549371] ? wait_for_completion+0x8a0/0x8a0 [ 691.553993] ? mutex_unlock+0xd/0x10 [ 691.557734] ? kernfs_activate+0x21a/0x2c0 [ 691.562014] ? kernfs_walk_and_get_ns+0x340/0x340 [ 691.566893] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 691.572453] ? kernfs_link_sibling+0x1d2/0x3b0 [ 691.577069] kernfs_new_node+0x95/0x120 [ 691.581074] __kernfs_create_file+0x5a/0x340 [ 691.585521] sysfs_add_file_mode_ns+0x222/0x530 [ 691.590227] internal_create_group+0x3df/0xd80 [ 691.594849] ? remove_files.isra.1+0x190/0x190 [ 691.599454] ? up_write+0x7b/0x220 [ 691.603025] ? down_write_nested+0x130/0x130 [ 691.607461] ? down_read+0x120/0x120 [ 691.611214] sysfs_create_group+0x1f/0x30 [ 691.615387] lo_ioctl+0x1307/0x1d60 [ 691.619052] ? lo_rw_aio+0x1ef0/0x1ef0 [ 691.622964] blkdev_ioctl+0x98e/0x21b0 [ 691.626878] ? blkpg_ioctl+0xc10/0xc10 [ 691.630808] ? lock_downgrade+0x900/0x900 [ 691.634984] ? check_preemption_disabled+0x48/0x280 [ 691.640036] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 691.644988] ? kasan_check_read+0x11/0x20 [ 691.649158] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 691.654459] ? rcu_softirq_qs+0x20/0x20 [ 691.658470] ? __fget+0x4d1/0x740 [ 691.661952] ? ksys_dup3+0x680/0x680 [ 691.665702] block_ioctl+0xee/0x130 [ 691.669350] ? blkdev_fallocate+0x400/0x400 [ 691.673694] do_vfs_ioctl+0x1de/0x1720 [ 691.677613] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 691.683181] ? ioctl_preallocate+0x300/0x300 [ 691.687611] ? memset+0x31/0x40 [ 691.691090] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 691.696655] ? smack_file_ioctl+0x210/0x3c0 [ 691.701001] ? fget_raw+0x20/0x20 [ 691.704487] ? smack_file_lock+0x2e0/0x2e0 [ 691.708745] ? rcu_read_lock_sched_held+0x14f/0x180 [ 691.713832] ? do_syscall_64+0x9a/0x820 [ 691.717843] ? do_syscall_64+0x9a/0x820 [ 691.721849] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 691.727407] ? security_file_ioctl+0x94/0xc0 [ 691.731841] ksys_ioctl+0xa9/0xd0 [ 691.735323] __x64_sys_ioctl+0x73/0xb0 [ 691.739236] do_syscall_64+0x1b9/0x820 [ 691.743156] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 691.748550] ? syscall_return_slowpath+0x5e0/0x5e0 [ 691.753513] ? trace_hardirqs_on_caller+0x310/0x310 [ 691.758558] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 691.763599] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 691.770291] ? __switch_to_asm+0x40/0x70 [ 691.774372] ? __switch_to_asm+0x34/0x70 [ 691.778464] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 691.783334] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 691.788539] RIP: 0033:0x4573d7 [ 691.791753] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 691.810694] RSP: 002b:00007f9f77a49a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 691.818422] RAX: ffffffffffffffda RBX: 00000000200002d0 RCX: 00000000004573d7 21:58:49 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660, 0xffffffff00000000], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 691.825713] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 691.833002] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 691.840294] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 691.847579] R13: 0000000000000000 R14: 00000000004d8320 R15: 0000000000000003 21:58:49 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debig_want_extra_isize'}}]}) 21:58:49 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:49 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660, 0x2], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:49 executing program 3 (fault-call:0 fault-nth:15): syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:58:49 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f00000015c0)=[{&(0x7f0000000500)="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", 0x181, 0x7a}]) 21:58:49 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x4040, 0x0) ioctl$DRM_IOCTL_AGP_ACQUIRE(r0, 0x6430) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)) [ 692.001198] FAULT_INJECTION: forcing a failure. [ 692.001198] name failslab, interval 1, probability 0, space 0, times 0 [ 692.027844] CPU: 0 PID: 5638 Comm: syz-executor3 Not tainted 4.19.0+ #92 [ 692.034730] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 692.044125] Call Trace: [ 692.044154] dump_stack+0x244/0x39d [ 692.044179] ? dump_stack_print_info.cold.1+0x20/0x20 [ 692.044212] should_fail.cold.4+0xa/0x17 [ 692.044236] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 692.044259] ? lock_release+0xa00/0xa00 [ 692.044283] ? perf_trace_sched_process_exec+0x860/0x860 [ 692.059792] ? zap_class+0x640/0x640 [ 692.059821] ? find_held_lock+0x36/0x1c0 [ 692.059843] ? __lock_is_held+0xb5/0x140 [ 692.059875] ? perf_trace_sched_process_exec+0x860/0x860 [ 692.059889] ? kernfs_activate+0x21a/0x2c0 [ 692.059917] __should_failslab+0x124/0x180 [ 692.059940] should_failslab+0x9/0x14 [ 692.074502] kmem_cache_alloc+0x2be/0x730 [ 692.074523] ? lock_downgrade+0x900/0x900 [ 692.074545] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 692.074568] __kernfs_new_node+0x127/0x8d0 [ 692.074590] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 692.082395] ? zap_class+0x640/0x640 [ 692.082425] ? __lock_is_held+0xb5/0x140 [ 692.082442] ? wait_for_completion+0x8a0/0x8a0 [ 692.082472] ? mutex_unlock+0xd/0x10 [ 692.142679] ? kernfs_activate+0x21a/0x2c0 [ 692.146941] ? kernfs_walk_and_get_ns+0x340/0x340 21:58:49 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:49 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660, 0x8800000000000000], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 692.151829] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 692.151845] ? kernfs_link_sibling+0x1d2/0x3b0 [ 692.151868] kernfs_new_node+0x95/0x120 [ 692.151891] __kernfs_create_file+0x5a/0x340 [ 692.151912] sysfs_add_file_mode_ns+0x222/0x530 [ 692.151938] internal_create_group+0x3df/0xd80 [ 692.151962] ? remove_files.isra.1+0x190/0x190 [ 692.162247] ? up_write+0x7b/0x220 [ 692.162264] ? down_write_nested+0x130/0x130 [ 692.162286] ? down_read+0x120/0x120 [ 692.196199] sysfs_create_group+0x1f/0x30 [ 692.200377] lo_ioctl+0x1307/0x1d60 [ 692.204046] ? lo_rw_aio+0x1ef0/0x1ef0 [ 692.207960] blkdev_ioctl+0x98e/0x21b0 [ 692.211878] ? blkpg_ioctl+0xc10/0xc10 [ 692.215810] ? lock_downgrade+0x900/0x900 [ 692.219991] ? check_preemption_disabled+0x48/0x280 [ 692.225046] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 692.230250] ? kasan_check_read+0x11/0x20 [ 692.234422] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 692.239723] ? rcu_softirq_qs+0x20/0x20 [ 692.243736] ? __fget+0x4d1/0x740 [ 692.247249] ? ksys_dup3+0x680/0x680 [ 692.251003] block_ioctl+0xee/0x130 [ 692.254659] ? blkdev_fallocate+0x400/0x400 [ 692.259007] do_vfs_ioctl+0x1de/0x1720 [ 692.262930] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 692.268496] ? ioctl_preallocate+0x300/0x300 [ 692.272936] ? memset+0x31/0x40 [ 692.276244] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 692.281831] ? smack_file_ioctl+0x210/0x3c0 [ 692.286176] ? fget_raw+0x20/0x20 [ 692.289651] ? smack_file_lock+0x2e0/0x2e0 [ 692.293917] ? rcu_read_lock_sched_held+0x14f/0x180 [ 692.298973] ? do_syscall_64+0x9a/0x820 [ 692.303079] ? do_syscall_64+0x9a/0x820 [ 692.307083] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 692.312650] ? security_file_ioctl+0x94/0xc0 [ 692.317093] ksys_ioctl+0xa9/0xd0 [ 692.320574] __x64_sys_ioctl+0x73/0xb0 [ 692.324491] do_syscall_64+0x1b9/0x820 [ 692.328411] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 692.333831] ? syscall_return_slowpath+0x5e0/0x5e0 [ 692.338822] ? trace_hardirqs_on_caller+0x310/0x310 [ 692.343871] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 692.348918] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 692.355616] ? __switch_to_asm+0x40/0x70 [ 692.359701] ? __switch_to_asm+0x34/0x70 [ 692.363942] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 692.368838] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 692.374052] RIP: 0033:0x4573d7 [ 692.377276] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 21:58:49 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 692.396204] RSP: 002b:00007f9f77a49a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 692.403936] RAX: ffffffffffffffda RBX: 00000000200002d0 RCX: 00000000004573d7 [ 692.411221] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 692.418508] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 692.425819] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 692.433105] R13: 0000000000000000 R14: 00000000004d8320 R15: 0000000000000003 21:58:49 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660, 0x2000000000000], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:49 executing program 3 (fault-call:0 fault-nth:16): syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:58:49 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f00000015c0)=[{&(0x7f0000000500)="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", 0x188, 0x7a}]) 21:58:49 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debog_want_extra_isize'}}]}) 21:58:49 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:49 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660, 0x20000], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 692.623424] FAULT_INJECTION: forcing a failure. [ 692.623424] name failslab, interval 1, probability 0, space 0, times 0 [ 692.662283] CPU: 1 PID: 5665 Comm: syz-executor3 Not tainted 4.19.0+ #92 [ 692.669185] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 692.678564] Call Trace: [ 692.681180] dump_stack+0x244/0x39d [ 692.684846] ? dump_stack_print_info.cold.1+0x20/0x20 [ 692.690079] should_fail.cold.4+0xa/0x17 [ 692.690106] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 692.690127] ? lock_release+0xa00/0xa00 [ 692.690141] ? perf_trace_sched_process_exec+0x860/0x860 [ 692.690168] ? zap_class+0x640/0x640 [ 692.699436] ? find_held_lock+0x36/0x1c0 [ 692.708866] ? __lock_is_held+0xb5/0x140 [ 692.708886] ? cfg80211_wext_siwscan+0xa8/0x16a0 [ 692.708918] ? perf_trace_sched_process_exec+0x860/0x860 [ 692.708933] ? kernfs_activate+0x21a/0x2c0 [ 692.708961] __should_failslab+0x124/0x180 [ 692.708983] should_failslab+0x9/0x14 [ 692.716765] kmem_cache_alloc+0x2be/0x730 [ 692.716807] ? lock_downgrade+0x900/0x900 [ 692.716828] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 692.716857] __kernfs_new_node+0x127/0x8d0 [ 692.761080] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 692.761101] ? zap_class+0x640/0x640 [ 692.761128] ? __lock_is_held+0xb5/0x140 [ 692.761150] ? wait_for_completion+0x8a0/0x8a0 [ 692.769642] ? mutex_unlock+0xd/0x10 [ 692.769658] ? kernfs_activate+0x21a/0x2c0 [ 692.769677] ? kernfs_walk_and_get_ns+0x340/0x340 [ 692.769697] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 692.769710] ? kernfs_link_sibling+0x1d2/0x3b0 [ 692.769733] kernfs_new_node+0x95/0x120 [ 692.805314] __kernfs_create_file+0x5a/0x340 [ 692.809750] sysfs_add_file_mode_ns+0x222/0x530 [ 692.814481] internal_create_group+0x3df/0xd80 [ 692.819098] ? remove_files.isra.1+0x190/0x190 [ 692.823702] ? up_write+0x7b/0x220 [ 692.827266] ? down_write_nested+0x130/0x130 [ 692.832474] ? down_read+0x120/0x120 [ 692.836222] sysfs_create_group+0x1f/0x30 [ 692.840397] lo_ioctl+0x1307/0x1d60 [ 692.844059] ? lo_rw_aio+0x1ef0/0x1ef0 [ 692.847972] blkdev_ioctl+0x98e/0x21b0 [ 692.851881] ? blkpg_ioctl+0xc10/0xc10 [ 692.855811] ? lock_downgrade+0x900/0x900 [ 692.859984] ? check_preemption_disabled+0x48/0x280 [ 692.865024] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 692.869978] ? kasan_check_read+0x11/0x20 [ 692.874148] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 692.879634] ? rcu_softirq_qs+0x20/0x20 [ 692.883643] ? __fget+0x4d1/0x740 [ 692.887187] ? ksys_dup3+0x680/0x680 [ 692.890936] block_ioctl+0xee/0x130 [ 692.894592] ? blkdev_fallocate+0x400/0x400 [ 692.898940] do_vfs_ioctl+0x1de/0x1720 [ 692.902927] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 692.908492] ? ioctl_preallocate+0x300/0x300 [ 692.912929] ? memset+0x31/0x40 [ 692.916236] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 692.921818] ? smack_file_ioctl+0x210/0x3c0 [ 692.926158] ? fget_raw+0x20/0x20 [ 692.929636] ? smack_file_lock+0x2e0/0x2e0 [ 692.934155] ? rcu_read_lock_sched_held+0x14f/0x180 [ 692.939267] ? do_syscall_64+0x9a/0x820 [ 692.943326] ? do_syscall_64+0x9a/0x820 [ 692.947328] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 692.952887] ? security_file_ioctl+0x94/0xc0 [ 692.957320] ksys_ioctl+0xa9/0xd0 [ 692.960815] __x64_sys_ioctl+0x73/0xb0 [ 692.964729] do_syscall_64+0x1b9/0x820 [ 692.968639] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 692.974028] ? syscall_return_slowpath+0x5e0/0x5e0 [ 692.978988] ? trace_hardirqs_on_caller+0x310/0x310 [ 692.984026] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 692.989065] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 692.995758] ? __switch_to_asm+0x40/0x70 [ 692.999864] ? __switch_to_asm+0x34/0x70 [ 693.003952] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 693.008845] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 693.014054] RIP: 0033:0x4573d7 [ 693.017272] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 693.036196] RSP: 002b:00007f9f77a49a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 693.043927] RAX: ffffffffffffffda RBX: 00000000200002d0 RCX: 00000000004573d7 [ 693.051218] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 693.058503] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 693.065817] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 21:58:50 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 693.073104] R13: 0000000000000000 R14: 00000000004d8320 R15: 0000000000000003 21:58:50 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, &(0x7f0000000040)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x4020, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)) [ 693.096497] Dev loop4: unable to read RDB block 1 [ 693.103985] loop4: unable to read partition table [ 693.123093] loop4: partition table beyond EOD, truncated 21:58:50 executing program 3 (fault-call:0 fault-nth:17): syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:58:50 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660, 0x1000000], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:50 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 693.170800] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 21:58:50 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f00000015c0)=[{&(0x7f0000000500)="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", 0x181, 0x7a}]) [ 693.260940] FAULT_INJECTION: forcing a failure. [ 693.260940] name failslab, interval 1, probability 0, space 0, times 0 21:58:50 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 693.302472] CPU: 0 PID: 5713 Comm: syz-executor3 Not tainted 4.19.0+ #92 [ 693.309386] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 693.318849] Call Trace: [ 693.321476] dump_stack+0x244/0x39d [ 693.325137] ? dump_stack_print_info.cold.1+0x20/0x20 [ 693.330373] should_fail.cold.4+0xa/0x17 [ 693.330401] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 693.330436] ? lock_release+0xa00/0xa00 [ 693.330460] ? perf_trace_sched_process_exec+0x860/0x860 21:58:50 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660, 0x300], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 693.339640] ? zap_class+0x640/0x640 [ 693.339661] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 693.339687] ? find_held_lock+0x36/0x1c0 [ 693.339708] ? __lock_is_held+0xb5/0x140 [ 693.339737] ? put_dec+0x3b/0xf0 [ 693.339753] ? perf_trace_sched_process_exec+0x860/0x860 [ 693.339790] ? zap_class+0x640/0x640 [ 693.339814] __should_failslab+0x124/0x180 [ 693.339835] should_failslab+0x9/0x14 [ 693.339853] kmem_cache_alloc_node+0x26e/0x730 [ 693.339871] ? find_held_lock+0x36/0x1c0 [ 693.395825] __alloc_skb+0x119/0x770 21:58:50 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 693.399568] ? netdev_alloc_frag+0x1f0/0x1f0 [ 693.404002] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 693.408961] ? kasan_check_read+0x11/0x20 [ 693.413136] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 693.418440] ? rcu_softirq_qs+0x20/0x20 [ 693.422454] ? netlink_has_listeners+0x2cb/0x4a0 [ 693.427233] ? netlink_tap_init_net+0x3d0/0x3d0 [ 693.431936] alloc_uevent_skb+0x84/0x1da [ 693.436036] kobject_uevent_env+0xa52/0x101e [ 693.440485] kobject_uevent+0x1f/0x24 [ 693.444321] lo_ioctl+0x1385/0x1d60 [ 693.447980] ? lo_rw_aio+0x1ef0/0x1ef0 [ 693.451986] blkdev_ioctl+0x98e/0x21b0 [ 693.455901] ? blkpg_ioctl+0xc10/0xc10 [ 693.459831] ? lock_downgrade+0x900/0x900 [ 693.463998] ? check_preemption_disabled+0x48/0x280 [ 693.469063] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 693.474026] ? kasan_check_read+0x11/0x20 [ 693.478233] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 693.483536] ? rcu_softirq_qs+0x20/0x20 [ 693.487545] ? __fget+0x4d1/0x740 [ 693.491040] ? ksys_dup3+0x680/0x680 [ 693.494811] block_ioctl+0xee/0x130 [ 693.498464] ? blkdev_fallocate+0x400/0x400 [ 693.502834] do_vfs_ioctl+0x1de/0x1720 [ 693.506749] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 693.512343] ? ioctl_preallocate+0x300/0x300 [ 693.516908] ? memset+0x31/0x40 [ 693.520215] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 693.525760] ? smack_file_ioctl+0x210/0x3c0 [ 693.530102] ? fget_raw+0x20/0x20 [ 693.533558] ? smack_file_lock+0x2e0/0x2e0 [ 693.537811] ? rcu_read_lock_sched_held+0x14f/0x180 [ 693.542850] ? do_syscall_64+0x9a/0x820 [ 693.546839] ? do_syscall_64+0x9a/0x820 [ 693.550828] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 693.556371] ? security_file_ioctl+0x94/0xc0 [ 693.560921] ksys_ioctl+0xa9/0xd0 [ 693.564391] __x64_sys_ioctl+0x73/0xb0 [ 693.568295] do_syscall_64+0x1b9/0x820 [ 693.572202] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 693.577569] ? syscall_return_slowpath+0x5e0/0x5e0 [ 693.582499] ? trace_hardirqs_on_caller+0x310/0x310 [ 693.587528] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 693.592559] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 693.599228] ? __switch_to_asm+0x40/0x70 [ 693.603295] ? __switch_to_asm+0x34/0x70 [ 693.608050] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 693.612922] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 693.618110] RIP: 0033:0x4573d7 [ 693.621303] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 693.640210] RSP: 002b:00007f9f77a49a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 21:58:50 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'deb+g_want_extra_isize'}}]}) 21:58:50 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:50 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660, 0x3], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 693.647933] RAX: ffffffffffffffda RBX: 00000000200002d0 RCX: 00000000004573d7 [ 693.655196] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 693.662461] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 693.669724] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 693.676987] R13: 0000000000000000 R14: 00000000004d8320 R15: 0000000000000003 21:58:51 executing program 3 (fault-call:0 fault-nth:18): syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:58:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x6) write(r0, &(0x7f0000000680)="e3edf1c080d55c9cedf6ccaf105c1634a0df040706ca55e581826be47ade471c0dca8a8643e66046371bd53b01808f1556b3a52fec11af6afe4d2a9a5b51a7d948a54b5745c688b72162aa8afed4a50793ea58492da056d7c6424528c19f7926a2f1be9a4d2e72dc23243e27cc98803f8b00f6b7f0bef2e54cb895d0a96e60628450248583df22cd15a25345f33f69e03a11e22f9aa5172dfb84d9fa1a29b1cbacfa80a6745ff597d416a2b79049af93ec160ab42c244e7cc0aeda41642ada66cac782d0a6671da62dea941dc31aac5b12409f9a8e125b3255cc24130d556794110f75e3f1d9e529560744932e32c8432ff95800d279fbb524feb4e836dd51b306beeea852d4af0282e2e37f070b3d26c259c386b26b771e04f04d63fb45aaa55f2c7af071c9a36dbe6a813f10379d6e3e03d3557e751e0ea11c3a8a39bc4b80a18746d7f741d07014246da1364d75c35a49a1679f69007be1ca627f68b49dc7e801f5f0c6eb2832814dbe6f7a2cce03b771407f8da7c5b8234416f58f22487eaa526576507cba5f7bef56e14ee0eeb3bc1c216a7021a86da08679dc3b11dc1b22f6996d2c38f6482938986adb2189b16c82ba9628fa421f22aeda40f515762f2f4112619eaa28ed95013ee16425365881fef43b0294f9a089a821e678969d28fcb2b24499ade81a17f405e3d236b890dd6009527c1330d5f302fa05a93ec07a001eff7c48ed5abbd12c4ef03ddc40a6a285ff55ee93cb5fdc97e95f46f93e639089184ef9b543e7860adf27e444b9561124292ad76be84a16aa907e913e5d8019126d8c65e13f6f8f0dff0541e8428e6ffb6edd38f6f68375b5c837aa319558b04c09213dfb06ed72ad7973dc7fe83ea7ed09fcba1cd1aab4ec31384dc249dbce42f78466ededfcd3f87f17751f379f314f82518700e6b8ada589b232f6b9375908736730f9d8c9cf4a1077b1e0196f067a3fc70e8210bc8a6e605a0a54482ca32a1c07c59bd6664360d5a6d97555013026f90320908f75a62ad2e850c488bba9a684771b25620f42dced1426e176d83adfe24deab1dae49ef0ee200c8301658b5e077eb271aa04eb95ba8b4f58d1ac900ad22ca1966a1a6aac6db31a17420a6d2555a6bc0b39f84971b5ad79f25551a42f24a66154e798b3aa1eec7d4bd9cb6687071b03bd953e515b3dbfb15a828d7a72133f056197646e44f536e2939b494c5da4c0b2e8f978655834d043e75858b274d2bb8cb41a0addbf1175b88724486b21dd7ac55e8a8f15362b426feb3088dfa19876f984fb8f180e83b9d4c1a0d926782779925770fbdc1a46c0ffa8b91480fa6f13d03074b99332c9792b4fa80171fb6a06b337b4910948deda86d858009de3aaa9ae8a53f9aa595665c821f4ff54969c497fdaf00a65fc0b21c83f7744d7ca10f598c3920295bcb9282602fc98ced34d0f86e1f9041c375bca4296356ee845f52f78f590cdb2c6d6afa1c58801eea26b70d6ca84ff1ca98ed1d85170c4096261573ab6abc3a16b582d43171b51045774be53496ffe8cb98df02235dcb72c70da832e339288404c61e7fd71d482ab79ef5b2d5f1c6890bd34331223393ece4cb392547e47d6104fb87aca814ae8e1cac3cc70cf9ba115bde6f5b971dd366d944bb4e5ada8a139a5b5bd80cd6b4a9a4c2dfd5739f48b9c1813c4a1174f0fd59556607089dbe5b0a552f1f294016a608a1cad0ed71ee7670da5a6f8148d50ee7af8252284e1697d3b812c9dd0b42642946711979c8726f22a71cb8500c1254fd7e7244966939eafeeae3e178276d14c4b3240ee718c624da6346b09407203130e9a5c91979d84727d91651e8ac2d899044dbaca4e5bd42d886caf25f6c7b928e7a58b01663f2a29ee91de95610c196a8dd97c7d9cc6ee9f8f807e0fbaef5531e7a45f6f2e2e0eef7bd99a74249b671533ee8cf5d8387e1dfbd8b140cf1e648d7ea690f1977a8714fd704e4a542da76323f2709e8e779147c5fd316d1fd3ee180671242058684f4b33a96341923d44bd74af4f727bebfafc77646617025ae6bcad8b335fef9d62d0924ef6573d609b6d7a5608486901413ee57595d84aecb3df3245a86129e1fca678825d2d1c5df871cbf5bd83ac13f6a0a97df117cd5893c7da0a6095922ca03475e4468c25dae89e76507a7cb96170b8f6afaee6d096f6ccbc5e0371632a2094161f5fbab241e3fe7d144d934628a7cd5158183d768b60bb43aefc451e48052d83ed35d019f61b4fc5302566f171a4273510591d0da6e4e47a82723f109f5caa59b8a6810b53be287ef62b4069324b454a451b31a99283ac0a63678185a6eb44f3aa7976c9d10c07f9ef7c5a76969730a3cf49a0bb183609c47b2c264a5118fca0f341498870d7458dc4c56e9057f508d924cc991d4969b497f7de8304032c475e5e62d7ec85065fac08b8927c582e1f04c56119917b2ee7200daa87903f1290f66040172332ce7ea2feb678fdcaf6b98d6d3ccf0b52ca8dbd80db6b2c4d4d9c5567febe8317f2dff5d8629a891ec9b9483a865ddc34af7df4d7c103579f12160ae7a142e83bf681e8696dda8f4b912e3abd18744702305ef6a237d175b0a6e34f7df5e8f29dcdf423554598cd443a309f4f7235923f46f337e97a8bfa8f2193d57327dc93dff22f16bb71e3cc72ec02dfc4c2e6f40e66cdc3da87c2deeea5c8d7b064a6f3822b88f9c42db6dc5ad474b0a2cf703e82f9f3ad85f0e399a0c085c18165aaacd582c4e341f8c9ed38f1a87d1f02fc39dea1beeaec33f39c9e4671e17498f035845e9ca324ecb7bc822127200f9f31f5511384053cfa500d036d2c8f5310b54738df52da90ab38fe2287d78e27ce5fea124ad5efc61f0fe14c162a62f1aecf0d4f0f3f3c0df25656274ac500bb7f001969d4a06b28385237ebee5b083f91c3bd78a229d4fd202b0598ddf78c9fc0eb2f9b1a29c691cb97bb8cf109b198ea34d24074fb53b426e4e56c5150614095c2418564a8ff84ead8c46d79b015e5dc980f7addbd44b16534ed6b481842835af8728aabaf8e192cd50eed0703223e7f7428d70de4e2106eceea86bbf621f0eedb31533e6f36f60a4cfee2875862e673e9665ad2be24d2ece2543dc7f5961b9e735090bafd475580086949e34a6023a00e50f70720b4152d9d26e7e491b7fca54283b83169ff0aa6725da7c615d29985680202580c73829670e6a43310fbd8f3ccce7e41a4cd07b7f58a171f27cbcf7157d0c257d799b435af66d754f04e2f8acc197604a7361b90f65a836fa82462936b861fc980a924bbb4aa660bf3216958223fec60c2367e84b06b1729d358ccb6e31efe19bc287d09c862b2457f77ed68f5869ccd327c2e1f53323308a6b75ffe19da34655981611e73f78d27c2ea9b42b8cdbff7d29405b5bdd3ff8153ffe3c64233690b9318fcf3bc209f1c41c03bb3c6775836048719e2e37f916a0a7416d9e078ff4861c47c8ed790391326a7d51b0528ac4d09a89f5ee67276d19d68bdf7325243c0d0b8b9394d7b554cc20f220a951db7c5cafb3cd70c8bcbafbb411ba399c4ae412b2d2dc082cc311b77b8a209c3eafcf6059264663011a72af59161839fa1504224e5c6d0a42e7bbf9c46cdccaa35728042c4cda8d14eac483664e61fbf517812a7cc23d24c797bab8fb7c39489bc99a4cfbda374c8b717929a46321ea05b1f3e3a53e2b782d3f2efb7fb262ba1f569d30983478ceb1578dca77026bd754496dc0a3f6f85767a7cf8096236601882afd4d081b9b3565fe5e92f017c5e00306fe8cbcfb430ba55b1f70df2c0cff6dd4d92d224e393af4812a9cddaaa6f8507eb5489b8adfec850d0e1cb4b0ad91a65dda747e5ae5553450ae9280c846d2b80066991bb0dd44b51ba8e1321c3b669bcfdf34eeae58f473a82586f018e97336c2a9ba7db690bc29347c2d0ab2ff7d4ed021e77213879bf6554897d5d2c8b701dbdba1ad87e46bb6ed89cc01030d4d4305b4e8a7a66ce39ee12c620c0e7db1ca23c923558f26aceb8323dff330a29a37882e112b272962ff340907d283d2b968b15a6185254145b6deb288e7339feec1e9cc30b410bd7419af21aba876c7dfc634d416cbeb8f7f3c26a692bd7fbf2d6eb483e1225cf66dff9e9251d6bf6a1e6374b2f7df43d6d5ebc6ad80b985a9f9eec91321f4a54649cd17f854fd9a9a3edf5f70aba502eacf5618e9221bb429ff522d51dd0b8d80030fb5877982b4a23b34fcb3629a904224ce16ccdd4c34f3c3aeb77d9fd9670caa84bd30d8ef7e805ead3c8900b4adea2b0e756c418aab5550e8ba32f22c1be4d8a53fd5236e785106fd33664e2f4b00f0af8787b31527931b41d6ac762ba3664b8313f75057e07622618f02c0743b4b3498f3ad5d543cb7cf8d367078d722ffff69a68ee7f1bd6a4ed51b9ae0f4072f563600fb7491f32011693811b387cb884250298e0b9eff6d9a03d61c1a9d112b006bc598e61885317b26ee38f053a668a469f0ba0cd11f6bb444efef00a36f71bdf5ba478dde0ff7f5e80dc1bec21690525754f051f3db6fafabd2bcb850101d7378ec1368075054a9956c8008e02dd19c16e3e35024778b7e48cfedf5d403d4e7badf461d9cf8b62a663249bb8e35d5a8232ca9bce50224f6da9d343a8b2c72b205942e0004ec6dee338659bb5efde8debc291249fc3193a5cfadf2ce7d0bf869d5a35c99d41c09f764d7b7e499149035415e2a187b5c0a5b1ba87fc82708e81b673bf5296c835711f240b3f16ecd3fceecce7a9d763dafee9236e0ee3f77df2923d5c3999af12aa92f07031d047ba325bb8ea8d1575aaa31fd44d9cf3b6c373f2fd9f58f0e9c4cb09fb8ceb3c10a04c9e1883794f49646fb9ef0119e8f8a4354378dd0ad4d83b9933c72f10a27dcd270f1feb22a11a0c960a7426f46d4036c573109ddd78583ca3189681370c91d943712aa97bbeedf301ade69735be47fad0dc2cd7690dfd3a4ea32dca11052ca61c4865d311cdcf71729af292a290f550bb17ed0bd63329efc03cffdcf38efd1763fc9fde91baaaf2b4d3db4220ebe39cd3ef7955b2dfe1630f5d3118b0e5c0d1f082f6d2cef4e76474ef4184a4274eb496e4c0e2b664d6f2fa9029938592f33b36cc89814d497ece1f44e7b5178af58f83e3459100538cb8e9898d5291d0a1440846908f93211fbf827ec85453268056c42ad3331be08ea65fc0899bb056291b7ca53273a4d7f84cebe3fa28932ff0c4eadbd8ee58bd1ac65d4320f78e8b17f89acfac665d26aa7d28ebed753e51157230881fd73441d41b23298c8f5e7125c55bc70bf157cc6f31dce179582a091f42df00cab90a041104a67091769d6f25d1406fe7cda57b03b87e9da11ed548fc488577edddb0f2cd4ed0f2760d7fc3fafb763166f22a13ea23e97d68ca61f48fd44ff2bed65f07c0f48b0a9cdbd123c8fd5e412eaf57fa5899489b5b1175f0220e4d9e7658ab9d7f490ad713dc3c8785a837c8af5cb107872660a4646d3c375a1e5c8f0f6a819c105db157aa836a0768837a46746930c46cc615e469b93a628f28e2627b592dd4e2be36cff9469ee47084abda0d75bbd0a034581a47861d21e5abd2ef65850a6d0c696b0fef393f8002ecb2b7c382c5bc9718b081b22fda86090a8ad82ce6000c38550f195b1f45860b47cde872adeca9ec773af7772882153499b8596763e141913b3bd86d65953aa96be0f8834408536881be9671ab5e96145b15b94df2a17db69dec45cdb2c052152458a5630f7fcafe635944186b7a", 0x1000) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000002340), 0x100020, &(0x7f00000023c0)={[{@mblk_io_submit='mblk_io_submit'}, {@data_err_ignore='data_err=ignore'}, {@noauto_da_alloc='noauto_da_alloc'}, {@journal_path={'journal_path', 0x3d, './file0'}}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f00000004c0)=0xe8) mount$bpf(0x0, &(0x7f0000000200)='./file0/file0\x00', &(0x7f0000000240)='bpf\x00', 0x220000, &(0x7f0000000500)={[{@mode={'mode', 0x3d, 0x100}}, {@mode={'mode', 0x3d, 0xc3}}, {@mode={'mode', 0x3d, 0xfffffffffffffffb}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7fffffff}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x7fffffff}}], [{@euid_eq={'euid', 0x3d, r1}}, {@pcr={'pcr', 0x3d, 0x36}}, {@obj_type={'obj_type'}}, {@euid_eq={'euid', 0x3d, r2}}, {@fsname={'fsname', 0x3d, "00f83f0080"}}]}) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f00000001c0)='vmnet0(em0#mime_type\x00', 0x15, 0x2) 21:58:51 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:51 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f00000015c0)=[{&(0x7f0000000500)="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", 0x181, 0x7a}]) [ 693.871627] FAULT_INJECTION: forcing a failure. [ 693.871627] name failslab, interval 1, probability 0, space 0, times 0 [ 693.885976] EXT4-fs: 10 callbacks suppressed [ 693.885989] EXT4-fs (sda1): Unrecognized mount option "deb+g_want_extra_isize=0x0000000000000000" or missing value [ 693.903925] CPU: 1 PID: 5740 Comm: syz-executor3 Not tainted 4.19.0+ #92 [ 693.910824] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 693.920197] Call Trace: [ 693.922837] dump_stack+0x244/0x39d [ 693.926500] ? dump_stack_print_info.cold.1+0x20/0x20 [ 693.931730] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 693.937329] should_fail.cold.4+0xa/0x17 [ 693.941419] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 693.946551] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 693.952108] ? wake_up_klogd+0x11a/0x180 [ 693.956189] ? console_device+0xc0/0xc0 [ 693.960190] ? __down_trylock_console_sem+0x151/0x1f0 [ 693.965409] ? zap_class+0x640/0x640 [ 693.969147] ? vprintk_emit+0x293/0x990 [ 693.973151] ? find_held_lock+0x36/0x1c0 [ 693.977243] ? __lock_is_held+0xb5/0x140 [ 693.981324] ? process_one_work+0x1c38/0x1c40 [ 693.985920] ? perf_trace_sched_process_exec+0x860/0x860 [ 693.991400] ? vprintk_default+0x28/0x30 [ 693.995488] __should_failslab+0x124/0x180 [ 693.999755] should_failslab+0x9/0x14 [ 694.003619] kmem_cache_alloc_trace+0x2d7/0x750 [ 694.008326] kobject_uevent_env+0x2f3/0x101e [ 694.012863] kobject_uevent+0x1f/0x24 [ 694.016694] lo_ioctl+0x1385/0x1d60 [ 694.020356] ? lo_rw_aio+0x1ef0/0x1ef0 [ 694.024270] blkdev_ioctl+0x98e/0x21b0 [ 694.028181] ? blkpg_ioctl+0xc10/0xc10 [ 694.032092] ? lock_downgrade+0x900/0x900 [ 694.036259] ? check_preemption_disabled+0x48/0x280 [ 694.041303] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 694.046262] ? kasan_check_read+0x11/0x20 [ 694.050437] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 694.055735] ? rcu_softirq_qs+0x20/0x20 [ 694.059792] ? __fget+0x4d1/0x740 [ 694.063272] ? ksys_dup3+0x680/0x680 [ 694.067023] block_ioctl+0xee/0x130 [ 694.070677] ? blkdev_fallocate+0x400/0x400 [ 694.075026] do_vfs_ioctl+0x1de/0x1720 [ 694.078947] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 694.084513] ? ioctl_preallocate+0x300/0x300 [ 694.088956] ? memset+0x31/0x40 [ 694.092257] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 694.097835] ? smack_file_ioctl+0x210/0x3c0 [ 694.102180] ? fget_raw+0x20/0x20 [ 694.105666] ? smack_file_lock+0x2e0/0x2e0 [ 694.109923] ? rcu_read_lock_sched_held+0x14f/0x180 [ 694.114976] ? do_syscall_64+0x9a/0x820 [ 694.118970] ? do_syscall_64+0x9a/0x820 [ 694.122975] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 694.128543] ? security_file_ioctl+0x94/0xc0 [ 694.132983] ksys_ioctl+0xa9/0xd0 [ 694.136465] __x64_sys_ioctl+0x73/0xb0 [ 694.140378] do_syscall_64+0x1b9/0x820 [ 694.144295] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 694.149682] ? syscall_return_slowpath+0x5e0/0x5e0 [ 694.154633] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 694.159497] ? trace_hardirqs_on_caller+0x310/0x310 [ 694.164550] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 694.169591] ? prepare_exit_to_usermode+0x291/0x3b0 [ 694.174632] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 694.179508] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 694.184725] RIP: 0033:0x4573d7 [ 694.187942] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 694.206862] RSP: 002b:00007f9f77a49a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 694.214586] RAX: ffffffffffffffda RBX: 00000000200002d0 RCX: 00000000004573d7 21:58:51 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:51 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660, 0x88], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 694.221872] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 694.229418] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 694.236706] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 694.243994] R13: 0000000000000000 R14: 00000000004d8320 R15: 0000000000000003 21:58:51 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 694.289360] EXT4-fs (sda1): Ignoring removed mblk_io_submit option [ 694.305452] EXT4-fs (sda1): Cannot specify journal on remount 21:58:51 executing program 3 (fault-call:0 fault-nth:19): syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:58:51 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660, 0x7000000], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 694.370117] EXT4-fs (sda1): Unrecognized mount option "deb+g_want_extra_isize=0x0000000000000000" or missing value 21:58:51 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debXg_want_extra_isize'}}]}) 21:58:51 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f00000015c0)=[{&(0x7f0000000500)="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", 0x181, 0x7a}]) 21:58:51 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:51 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660, 0xfeffff07], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 694.455883] FAULT_INJECTION: forcing a failure. [ 694.455883] name failslab, interval 1, probability 0, space 0, times 0 [ 694.468360] EXT4-fs (sda1): Ignoring removed mblk_io_submit option [ 694.487478] EXT4-fs (sda1): Cannot specify journal on remount [ 694.515266] CPU: 1 PID: 5767 Comm: syz-executor3 Not tainted 4.19.0+ #92 [ 694.522161] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 694.531542] Call Trace: [ 694.534163] dump_stack+0x244/0x39d [ 694.537845] ? dump_stack_print_info.cold.1+0x20/0x20 [ 694.543069] ? is_bpf_text_address+0xd3/0x170 [ 694.547601] should_fail.cold.4+0xa/0x17 [ 694.551691] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 694.556850] ? zap_class+0x640/0x640 [ 694.560587] ? save_stack+0x43/0xd0 [ 694.564242] ? kasan_kmalloc+0xc7/0xe0 [ 694.568153] ? kmem_cache_alloc_trace+0x152/0x750 [ 694.573018] ? kobject_uevent_env+0x2f3/0x101e [ 694.577638] ? kobject_uevent+0x1f/0x24 [ 694.581638] ? lo_ioctl+0x1385/0x1d60 [ 694.585470] ? find_held_lock+0x36/0x1c0 [ 694.589564] ? __lock_is_held+0xb5/0x140 [ 694.593665] ? perf_trace_sched_process_exec+0x860/0x860 [ 694.599151] __should_failslab+0x124/0x180 [ 694.603415] should_failslab+0x9/0x14 [ 694.607242] __kmalloc+0x2e0/0x760 [ 694.610828] ? kobject_uevent_env+0x2f3/0x101e [ 694.615433] ? rcu_read_lock_sched_held+0x14f/0x180 [ 694.620560] ? kobject_get_path+0xc2/0x1b0 [ 694.624841] ? kmem_cache_alloc_trace+0x353/0x750 [ 694.629716] kobject_get_path+0xc2/0x1b0 [ 694.633823] kobject_uevent_env+0x314/0x101e [ 694.638275] kobject_uevent+0x1f/0x24 [ 694.642108] lo_ioctl+0x1385/0x1d60 [ 694.645791] ? lo_rw_aio+0x1ef0/0x1ef0 [ 694.649712] blkdev_ioctl+0x98e/0x21b0 [ 694.653627] ? blkpg_ioctl+0xc10/0xc10 [ 694.657543] ? lock_downgrade+0x900/0x900 [ 694.661718] ? check_preemption_disabled+0x48/0x280 [ 694.666761] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 694.671741] ? kasan_check_read+0x11/0x20 [ 694.675936] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 694.681233] ? rcu_softirq_qs+0x20/0x20 [ 694.685242] ? __fget+0x4d1/0x740 [ 694.688724] ? ksys_dup3+0x680/0x680 [ 694.692472] block_ioctl+0xee/0x130 [ 694.696122] ? blkdev_fallocate+0x400/0x400 [ 694.700466] do_vfs_ioctl+0x1de/0x1720 [ 694.704379] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 694.709943] ? ioctl_preallocate+0x300/0x300 [ 694.714375] ? memset+0x31/0x40 [ 694.717678] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 694.723303] ? smack_file_ioctl+0x210/0x3c0 [ 694.727648] ? fget_raw+0x20/0x20 [ 694.731128] ? smack_file_lock+0x2e0/0x2e0 [ 694.735382] ? rcu_read_lock_sched_held+0x14f/0x180 [ 694.740435] ? do_syscall_64+0x9a/0x820 [ 694.744428] ? do_syscall_64+0x9a/0x820 [ 694.748428] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 694.753990] ? security_file_ioctl+0x94/0xc0 [ 694.758429] ksys_ioctl+0xa9/0xd0 [ 694.761907] __x64_sys_ioctl+0x73/0xb0 [ 694.765836] do_syscall_64+0x1b9/0x820 [ 694.769751] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 694.775165] ? syscall_return_slowpath+0x5e0/0x5e0 [ 694.780120] ? trace_hardirqs_on_caller+0x310/0x310 [ 694.785161] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 694.790206] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 694.796899] ? __switch_to_asm+0x40/0x70 [ 694.800980] ? __switch_to_asm+0x34/0x70 [ 694.805072] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 694.809950] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 694.815156] RIP: 0033:0x4573d7 [ 694.818367] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 694.837282] RSP: 002b:00007f9f77a49a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 694.845009] RAX: ffffffffffffffda RBX: 00000000200002d0 RCX: 00000000004573d7 [ 694.852292] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 694.859577] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 694.866863] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 694.874149] R13: 0000000000000000 R14: 00000000004d8320 R15: 0000000000000003 21:58:52 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)) r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x8, 0x1c1480) ioctl$VIDIOC_S_HW_FREQ_SEEK(r0, 0x40305652, &(0x7f0000000080)={0x5, 0x5, 0x226, 0x3800000, 0x1f, 0xffffffff, 0x6}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x41) 21:58:52 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660, 0x8800], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:52 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:52 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f00000015c0)=[{&(0x7f0000000500)="f10457d357850ba96b3177c5432bf4d57c0df1e6e18ce27b33d45d2e44ea456be44eda49bb10e571862513b61f102eed99409fc67556483b021260a6f33dc13da1d50ddc83aa3a84a6f07efb3392e1a070fc93147c678e2c4902fd60a9f8022b1cd2f6cce4395660373a5d44cfb97743fa1936d10e0eca652e427449e026f4fc95277e2947ff7c23e8a9600b8d1f68338c57cab04985c591388803e6596d8bae0bd479bae6846d61e8fefe2551fc2e9859203159a172db93cf6c8c8f5905d602d33c5960cd9ee8105d2fa64f2dff6e70f20c95ec33e98d0588f3bfa4cf0f4b7110c203c2306b98360dc46505616c680611e12dff271a9918a3b8461ba1050bbbd417dbd8cfebe2d0098c84c96088389038c29083e639aca0781ec95d404510b103a582c1c888479ffe336ebd0ba87a1bf3d7420300fdf869e295b0e4e29d9700c930e48d202580b2acd201d0c54e13c7476a888fe6e77d03bb3caf8c17fde8efbf73696eee07a82dbe846b77433a1ecfa75200e5fa41dedc26dcd09bdcf7293e91c4e9671f", 0x185, 0x7a}]) 21:58:52 executing program 3 (fault-call:0 fault-nth:20): syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:58:52 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:52 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660, 0x4000], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 695.026097] EXT4-fs (sda1): Unrecognized mount option "debXg_want_extra_isize=0x0000000000000000" or missing value [ 695.086825] FAULT_INJECTION: forcing a failure. [ 695.086825] name failslab, interval 1, probability 0, space 0, times 0 [ 695.099939] CPU: 0 PID: 5797 Comm: syz-executor3 Not tainted 4.19.0+ #92 [ 695.106827] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 695.116200] Call Trace: [ 695.118835] dump_stack+0x244/0x39d [ 695.122497] ? dump_stack_print_info.cold.1+0x20/0x20 [ 695.127716] ? lock_downgrade+0x900/0x900 [ 695.131898] should_fail.cold.4+0xa/0x17 [ 695.135984] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 695.141105] ? rcu_softirq_qs+0x20/0x20 [ 695.145098] ? unwind_dump+0x190/0x190 [ 695.149020] ? is_bpf_text_address+0xd3/0x170 [ 695.153544] ? zap_class+0x640/0x640 [ 695.157282] ? __kernel_text_address+0xd/0x40 [ 695.161820] ? unwind_get_return_address+0x61/0xa0 [ 695.166803] ? find_held_lock+0x36/0x1c0 [ 695.170894] ? __lock_is_held+0xb5/0x140 [ 695.174993] ? kobject_uevent+0x1f/0x24 [ 695.178995] ? perf_trace_sched_process_exec+0x860/0x860 [ 695.184473] ? do_vfs_ioctl+0x1de/0x1720 [ 695.188551] ? ksys_ioctl+0xa9/0xd0 [ 695.192200] ? __x64_sys_ioctl+0x73/0xb0 [ 695.196293] ? do_syscall_64+0x1b9/0x820 [ 695.200383] __should_failslab+0x124/0x180 [ 695.204649] should_failslab+0x9/0x14 [ 695.208472] kmem_cache_alloc+0x2be/0x730 [ 695.212656] skb_clone+0x1bb/0x500 [ 695.216220] ? skb_split+0x11e0/0x11e0 [ 695.220124] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 695.225169] ? netlink_trim+0x1b4/0x380 [ 695.229168] ? netlink_skb_destructor+0x210/0x210 [ 695.234047] netlink_broadcast_filtered+0x110f/0x1680 [ 695.239275] ? __netlink_sendskb+0xd0/0xd0 [ 695.243544] ? kasan_check_read+0x11/0x20 [ 695.247714] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 695.253022] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 695.258590] ? refcount_inc_not_zero_checked+0x1e5/0x2f0 [ 695.264072] ? refcount_add_not_zero_checked+0x330/0x330 [ 695.269554] ? netlink_has_listeners+0x2cb/0x4a0 [ 695.274335] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 695.279386] netlink_broadcast+0x3a/0x50 [ 695.283478] kobject_uevent_env+0xa83/0x101e [ 695.287925] kobject_uevent+0x1f/0x24 [ 695.291751] lo_ioctl+0x1385/0x1d60 [ 695.295437] ? lo_rw_aio+0x1ef0/0x1ef0 [ 695.299360] blkdev_ioctl+0x98e/0x21b0 [ 695.303280] ? blkpg_ioctl+0xc10/0xc10 [ 695.307203] ? lock_downgrade+0x900/0x900 [ 695.311376] ? check_preemption_disabled+0x48/0x280 [ 695.316418] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 695.321366] ? kasan_check_read+0x11/0x20 [ 695.325535] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 695.330839] ? rcu_softirq_qs+0x20/0x20 [ 695.334871] ? __fget+0x4d1/0x740 [ 695.338356] ? ksys_dup3+0x680/0x680 [ 695.342094] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 695.347564] ? retint_kernel+0x1b/0x2d [ 695.351476] ? trace_hardirqs_on+0x310/0x310 [ 695.355916] block_ioctl+0xee/0x130 [ 695.359886] ? blkdev_fallocate+0x400/0x400 [ 695.364229] do_vfs_ioctl+0x1de/0x1720 [ 695.368139] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 695.373698] ? ioctl_preallocate+0x300/0x300 [ 695.378131] ? memset+0x31/0x40 [ 695.381429] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 695.386989] ? smack_file_ioctl+0x210/0x3c0 [ 695.391324] ? fget_raw+0x20/0x20 [ 695.394801] ? smack_file_lock+0x2e0/0x2e0 [ 695.399054] ? rcu_read_lock_sched_held+0x14f/0x180 [ 695.404097] ? do_syscall_64+0x9a/0x820 [ 695.408081] ? do_syscall_64+0x9a/0x820 [ 695.412075] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 695.417624] ? security_file_ioctl+0x94/0xc0 [ 695.422056] ksys_ioctl+0xa9/0xd0 [ 695.425527] __x64_sys_ioctl+0x73/0xb0 [ 695.429425] do_syscall_64+0x1b9/0x820 [ 695.433326] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 695.438702] ? syscall_return_slowpath+0x5e0/0x5e0 [ 695.443646] ? trace_hardirqs_on_caller+0x310/0x310 [ 695.448676] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 695.453703] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 695.460384] ? __switch_to_asm+0x40/0x70 [ 695.464452] ? __switch_to_asm+0x34/0x70 [ 695.468531] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 695.473395] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 695.478593] RIP: 0033:0x4573d7 [ 695.481806] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 695.500715] RSP: 002b:00007f9f77a49a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 695.508436] RAX: ffffffffffffffda RBX: 00000000200002d0 RCX: 00000000004573d7 [ 695.515712] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 695.522988] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 695.530267] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 21:58:52 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 695.537542] R13: 0000000000000000 R14: 00000000004d8320 R15: 0000000000000003 [ 695.557823] EXT4-fs (sda1): re-mounted. Opts: [ 695.596733] EXT4-fs (sda1): Unrecognized mount option "debXg_want_extra_isize=0x0000000000000000" or missing value 21:58:52 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debsg_want_extra_isize'}}]}) 21:58:52 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660, 0x278], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:52 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f00000015c0)=[{&(0x7f0000000500)="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", 0x185, 0x7a}]) 21:58:52 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 695.664493] EXT4-fs (sda1): re-mounted. Opts: 21:58:53 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)) 21:58:53 executing program 3 (fault-call:0 fault-nth:21): syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:58:53 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:53 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660, 0xfeffff0700000000], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 695.810174] FAULT_INJECTION: forcing a failure. [ 695.810174] name failslab, interval 1, probability 0, space 0, times 0 [ 695.829734] CPU: 0 PID: 5822 Comm: syz-executor3 Not tainted 4.19.0+ #92 [ 695.836650] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 695.846024] Call Trace: [ 695.848656] dump_stack+0x244/0x39d [ 695.852321] ? dump_stack_print_info.cold.1+0x20/0x20 [ 695.857558] should_fail.cold.4+0xa/0x17 [ 695.861664] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 695.866826] ? __save_stack_trace+0x8d/0xf0 [ 695.871192] ? zap_class+0x640/0x640 [ 695.874935] ? save_stack+0xa9/0xd0 [ 695.878590] ? save_stack+0x43/0xd0 [ 695.882262] ? find_held_lock+0x36/0x1c0 [ 695.886352] ? __lock_is_held+0xb5/0x140 [ 695.886382] ? zap_class+0x640/0x640 [ 695.886400] ? perf_trace_sched_process_exec+0x860/0x860 [ 695.886426] ? check_preemption_disabled+0x48/0x280 [ 695.904688] __should_failslab+0x124/0x180 21:58:53 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660, 0x400000000000000], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 695.908953] should_failslab+0x9/0x14 [ 695.912812] kmem_cache_alloc_node_trace+0x270/0x740 [ 695.917958] __kmalloc_node_track_caller+0x3c/0x70 [ 695.922921] __kmalloc_reserve.isra.40+0x41/0xe0 [ 695.927709] __alloc_skb+0x155/0x770 [ 695.931457] ? netdev_alloc_frag+0x1f0/0x1f0 [ 695.935891] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 695.940852] ? kasan_check_read+0x11/0x20 [ 695.945026] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 695.950336] ? rcu_softirq_qs+0x20/0x20 [ 695.954347] ? netlink_has_listeners+0x2cb/0x4a0 [ 695.959128] ? netlink_tap_init_net+0x3d0/0x3d0 [ 695.963850] alloc_uevent_skb+0x84/0x1da [ 695.967954] kobject_uevent_env+0xa52/0x101e [ 695.972407] kobject_uevent+0x1f/0x24 [ 695.976236] lo_ioctl+0x1385/0x1d60 [ 695.979900] ? lo_rw_aio+0x1ef0/0x1ef0 [ 695.983839] blkdev_ioctl+0x98e/0x21b0 [ 695.987754] ? blkpg_ioctl+0xc10/0xc10 [ 695.991699] ? lock_downgrade+0x900/0x900 [ 695.995877] ? check_preemption_disabled+0x48/0x280 [ 696.000926] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 696.005885] ? kasan_check_read+0x11/0x20 21:58:53 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660, 0x5000000], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 696.010059] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 696.015352] ? rcu_softirq_qs+0x20/0x20 [ 696.019357] ? __fget+0x4d1/0x740 [ 696.022848] ? ksys_dup3+0x680/0x680 [ 696.026602] block_ioctl+0xee/0x130 [ 696.030258] ? blkdev_fallocate+0x400/0x400 [ 696.034606] do_vfs_ioctl+0x1de/0x1720 [ 696.038526] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 696.044091] ? ioctl_preallocate+0x300/0x300 [ 696.048530] ? memset+0x31/0x40 [ 696.051850] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 696.057418] ? smack_file_ioctl+0x210/0x3c0 [ 696.061762] ? fget_raw+0x20/0x20 [ 696.061806] ? smack_file_lock+0x2e0/0x2e0 [ 696.061824] ? rcu_read_lock_sched_held+0x14f/0x180 [ 696.061854] ? do_syscall_64+0x9a/0x820 [ 696.061870] ? do_syscall_64+0x9a/0x820 [ 696.061894] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 696.069601] ? security_file_ioctl+0x94/0xc0 [ 696.069624] ksys_ioctl+0xa9/0xd0 [ 696.069645] __x64_sys_ioctl+0x73/0xb0 [ 696.069666] do_syscall_64+0x1b9/0x820 [ 696.069686] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe 21:58:53 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f00000015c0)=[{&(0x7f0000000500)="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", 0x185, 0x7a}]) 21:58:53 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 696.069704] ? syscall_return_slowpath+0x5e0/0x5e0 [ 696.069725] ? trace_hardirqs_on_caller+0x310/0x310 [ 696.069740] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 696.069759] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 696.069802] ? __switch_to_asm+0x40/0x70 [ 696.069817] ? __switch_to_asm+0x34/0x70 [ 696.069835] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 696.069857] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 696.069868] RIP: 0033:0x4573d7 [ 696.069884] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 696.069892] RSP: 002b:00007f9f77a49a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 696.069905] RAX: ffffffffffffffda RBX: 00000000200002d0 RCX: 00000000004573d7 [ 696.069913] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 696.069920] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 696.069929] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 696.069938] R13: 0000000000000000 R14: 00000000004d8320 R15: 0000000000000003 21:58:53 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660, 0x6], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:53 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'deb#g_want_extra_isize'}}]}) 21:58:53 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:53 executing program 3 (fault-call:0 fault-nth:22): syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:58:53 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f00000015c0)=[{&(0x7f0000000500)="f10457d357850ba96b3177c5432bf4d57c0df1e6e18ce27b33d45d2e44ea456be44eda49bb10e571862513b61f102eed99409fc67556483b021260a6f33dc13da1d50ddc83aa3a84a6f07efb3392e1a070fc93147c678e2c4902fd60a9f8022b1cd2f6cce4395660373a5d44cfb97743fa1936d10e0eca652e427449e026f4fc95277e2947ff7c23e8a9600b8d1f68338c57cab04985c591388803e6596d8bae0bd479bae6846d61e8fefe2551fc2e9859203159a172db93cf6c8c8f5905d602d33c5960cd9ee8105d2fa64f2dff6e70f20c95ec33e98d0588f3bfa4cf0f4b7110c203c2306b98360dc46505616c680611e12dff271a9918a3b8461ba1050bbbd417dbd8cfebe2d0098c84c96088389038c29083e639aca0781ec95d404510b103a582c1c888479ffe336ebd0ba87a1bf3d7420300fdf869e295b0e4e29d9700c930e48d202580b2acd201d0c54e13c7476a888fe6e77d03bb3caf8c17fde8efbf73696eee07a82dbe846b77433a1ecfa75200e5fa41dedc26dcd09bdcf7293e91c4e9671f86e6", 0x187, 0x7a}]) 21:58:53 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) bind(r0, &(0x7f00000001c0)=@llc={0x1a, 0x46d4a4aa3b22298e, 0x5, 0x4, 0x4, 0x7, @local}, 0x80) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)) [ 696.414437] FAULT_INJECTION: forcing a failure. [ 696.414437] name failslab, interval 1, probability 0, space 0, times 0 [ 696.448322] CPU: 1 PID: 5855 Comm: syz-executor3 Not tainted 4.19.0+ #92 [ 696.455216] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 696.464587] Call Trace: [ 696.464617] dump_stack+0x244/0x39d [ 696.464642] ? dump_stack_print_info.cold.1+0x20/0x20 [ 696.476068] ? lo_ioctl+0xe6/0x1d60 [ 696.476100] should_fail.cold.4+0xa/0x17 [ 696.476120] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 696.488955] ? blkpg_ioctl+0xc10/0xc10 [ 696.492871] ? lock_downgrade+0x900/0x900 [ 696.497044] ? check_preemption_disabled+0x48/0x280 [ 696.502093] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 696.507052] ? kasan_check_read+0x11/0x20 [ 696.511226] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 696.516550] ? find_held_lock+0x36/0x1c0 [ 696.520659] ? perf_trace_sched_process_exec+0x860/0x860 [ 696.526137] ? block_ioctl+0xee/0x130 [ 696.529973] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 696.535550] __should_failslab+0x124/0x180 [ 696.539841] should_failslab+0x9/0x14 [ 696.543673] kmem_cache_alloc+0x2be/0x730 [ 696.547855] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 696.553415] ? smack_file_ioctl+0x210/0x3c0 [ 696.553430] ? fget_raw+0x20/0x20 [ 696.553450] ? smack_file_lock+0x2e0/0x2e0 [ 696.561271] getname_flags+0xd0/0x590 [ 696.569313] do_mkdirat+0xc5/0x310 [ 696.572879] ? __ia32_sys_mknod+0xb0/0xb0 [ 696.577053] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 696.582450] ? trace_hardirqs_off_caller+0x310/0x310 [ 696.587579] ? ksys_ioctl+0x81/0xd0 [ 696.591237] __x64_sys_mkdir+0x5c/0x80 [ 696.595160] do_syscall_64+0x1b9/0x820 [ 696.599076] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 696.604464] ? syscall_return_slowpath+0x5e0/0x5e0 [ 696.609412] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 696.614274] ? trace_hardirqs_on_caller+0x310/0x310 [ 696.619310] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 696.624350] ? prepare_exit_to_usermode+0x291/0x3b0 [ 696.629396] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 696.634276] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 696.639484] RIP: 0033:0x456987 [ 696.642696] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 21:58:53 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:53 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:53 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 696.642706] RSP: 002b:00007f9f77a49a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 696.642721] RAX: ffffffffffffffda RBX: 00000000200002d0 RCX: 0000000000456987 [ 696.642736] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 696.676652] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 696.676666] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 696.698498] R13: 0000000000000000 R14: 00000000004d8320 R15: 0000000000000003 21:58:54 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660, 0x500000000000000], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:54 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 696.714905] Dev loop4: unable to read RDB block 1 [ 696.721163] loop4: unable to read partition table [ 696.746302] loop4: partition table beyond EOD, truncated 21:58:54 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660, 0x4000000000000000], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 696.767973] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 21:58:54 executing program 3 (fault-call:0 fault-nth:23): syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) [ 696.891551] FAULT_INJECTION: forcing a failure. [ 696.891551] name failslab, interval 1, probability 0, space 0, times 0 [ 696.911761] CPU: 1 PID: 5889 Comm: syz-executor3 Not tainted 4.19.0+ #92 [ 696.918657] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 696.928023] Call Trace: [ 696.928052] dump_stack+0x244/0x39d [ 696.928080] ? dump_stack_print_info.cold.1+0x20/0x20 [ 696.928106] ? lock_downgrade+0x900/0x900 [ 696.928133] should_fail.cold.4+0xa/0x17 [ 696.947766] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 696.952931] ? zap_class+0x640/0x640 [ 696.956660] ? mark_held_locks+0xc7/0x130 [ 696.960833] ? find_held_lock+0x36/0x1c0 [ 696.964897] ? __lock_is_held+0xb5/0x140 [ 696.968983] ? kasan_check_write+0x14/0x20 [ 696.973285] ? perf_trace_sched_process_exec+0x860/0x860 [ 696.978740] ? __switch_to_asm+0x34/0x70 [ 696.982822] __should_failslab+0x124/0x180 [ 696.987113] should_failslab+0x9/0x14 [ 696.990965] kmem_cache_alloc+0x2be/0x730 [ 696.995122] skb_clone+0x1bb/0x500 [ 696.998671] ? skb_split+0x11e0/0x11e0 [ 697.002577] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 697.007599] ? netlink_trim+0x1b4/0x380 [ 697.011579] ? netlink_skb_destructor+0x210/0x210 [ 697.016427] netlink_broadcast_filtered+0x110f/0x1680 [ 697.021635] ? __netlink_sendskb+0xd0/0xd0 [ 697.025896] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 697.031485] ? refcount_inc_not_zero_checked+0x1e5/0x2f0 [ 697.036939] ? refcount_add_not_zero_checked+0x330/0x330 [ 697.042394] ? check_memory_region+0x129/0x1b0 [ 697.046979] netlink_broadcast+0x3a/0x50 [ 697.051045] kobject_uevent_env+0xa83/0x101e [ 697.055461] kobject_uevent+0x1f/0x24 [ 697.059263] lo_ioctl+0x1385/0x1d60 [ 697.062912] ? lo_rw_aio+0x1ef0/0x1ef0 [ 697.066828] blkdev_ioctl+0x98e/0x21b0 [ 697.070714] ? blkpg_ioctl+0xc10/0xc10 [ 697.074729] ? lock_downgrade+0x900/0x900 [ 697.078890] ? check_preemption_disabled+0x48/0x280 [ 697.083971] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 697.088906] ? kasan_check_read+0x11/0x20 [ 697.093052] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 697.098390] ? rcu_softirq_qs+0x20/0x20 [ 697.102370] ? __fget+0x4d1/0x740 [ 697.105826] ? ksys_dup3+0x680/0x680 [ 697.109549] block_ioctl+0xee/0x130 [ 697.113188] ? blkdev_fallocate+0x400/0x400 [ 697.117520] do_vfs_ioctl+0x1de/0x1720 [ 697.121415] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 697.126952] ? ioctl_preallocate+0x300/0x300 [ 697.131364] ? memset+0x31/0x40 [ 697.134660] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 697.140196] ? smack_file_ioctl+0x210/0x3c0 [ 697.144513] ? fget_raw+0x20/0x20 [ 697.147970] ? smack_file_lock+0x2e0/0x2e0 [ 697.152201] ? rcu_read_lock_sched_held+0x14f/0x180 [ 697.157233] ? do_syscall_64+0x9a/0x820 [ 697.161219] ? do_syscall_64+0x9a/0x820 [ 697.165203] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 697.170739] ? security_file_ioctl+0x94/0xc0 [ 697.175149] ksys_ioctl+0xa9/0xd0 [ 697.178736] __x64_sys_ioctl+0x73/0xb0 [ 697.182626] do_syscall_64+0x1b9/0x820 [ 697.186517] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 697.191885] ? syscall_return_slowpath+0x5e0/0x5e0 [ 697.196829] ? trace_hardirqs_on_caller+0x310/0x310 [ 697.201847] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 697.206878] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 697.213566] ? __switch_to_asm+0x40/0x70 [ 697.217627] ? __switch_to_asm+0x34/0x70 [ 697.221701] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 697.226567] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 697.231751] RIP: 0033:0x4573d7 [ 697.234967] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 697.254018] RSP: 002b:00007f9f77a49a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 697.261735] RAX: ffffffffffffffda RBX: 00000000200002d0 RCX: 00000000004573d7 [ 697.269081] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 697.276392] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 697.283659] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 697.290936] R13: 0000000000000000 R14: 00000000004d8320 R15: 0000000000000003 21:58:54 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debcg_want_extra_isize'}}]}) 21:58:54 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:54 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f00000015c0)=[{&(0x7f0000000500)="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", 0x186, 0x7a}]) 21:58:54 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0xfffffffffffffff7}, 0x28, 0x2) 21:58:54 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660, 0x11000000], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:54 executing program 3 (fault-call:0 fault-nth:24): syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:58:54 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:54 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660, 0x4000000], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 697.439430] FAULT_INJECTION: forcing a failure. [ 697.439430] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 697.442851] Dev loop4: unable to read RDB block 1 [ 697.451292] CPU: 0 PID: 5905 Comm: syz-executor3 Not tainted 4.19.0+ #92 [ 697.451304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 697.451311] Call Trace: [ 697.451336] dump_stack+0x244/0x39d [ 697.451364] ? dump_stack_print_info.cold.1+0x20/0x20 [ 697.451402] should_fail.cold.4+0xa/0x17 [ 697.451432] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 697.474279] loop4: unable to read partition table [ 697.475079] ? kobject_uevent_env+0xf76/0x101e [ 697.483904] ? wait_for_completion+0x8a0/0x8a0 [ 697.483937] ? mark_held_locks+0x130/0x130 [ 697.483958] ? kobject_uevent_env+0x100d/0x101e [ 697.483986] ? mutex_unlock+0xd/0x10 [ 697.493169] ? lo_ioctl+0xe6/0x1d60 [ 697.493199] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 697.493217] ? should_fail+0x22d/0xd01 [ 697.493240] ? blkdev_ioctl+0x1f5/0x21b0 [ 697.498391] loop4: partition table beyond EOD, truncated [ 697.502761] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 697.502801] ? blkpg_ioctl+0xc10/0xc10 [ 697.502819] ? lock_downgrade+0x900/0x900 [ 697.502843] __alloc_pages_nodemask+0x34b/0xde0 [ 697.502862] ? kasan_check_read+0x11/0x20 [ 697.502879] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 697.502899] ? __alloc_pages_slowpath+0x2e10/0x2e10 [ 697.502923] ? find_held_lock+0x36/0x1c0 [ 697.502948] ? ipvlan_get_stats64+0x4a8/0x4e0 [ 697.520282] ? trace_hardirqs_off+0xb8/0x310 21:58:54 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 697.520306] cache_grow_begin+0xa5/0x8c0 [ 697.520325] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 697.520344] ? check_preemption_disabled+0x48/0x280 [ 697.520367] kmem_cache_alloc+0x66b/0x730 [ 697.520387] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 697.529581] ? fget_raw+0x20/0x20 [ 697.535948] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 697.537539] getname_flags+0xd0/0x590 [ 697.537561] do_mkdirat+0xc5/0x310 [ 697.537582] ? __ia32_sys_mknod+0xb0/0xb0 [ 697.537602] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 21:58:54 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 697.537624] ? trace_hardirqs_off_caller+0x310/0x310 [ 697.607184] ? ksys_ioctl+0x81/0xd0 [ 697.607208] __x64_sys_mkdir+0x5c/0x80 [ 697.607230] do_syscall_64+0x1b9/0x820 [ 697.607252] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 697.607271] ? syscall_return_slowpath+0x5e0/0x5e0 [ 697.607294] ? trace_hardirqs_on_caller+0x310/0x310 [ 697.623578] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 697.677349] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 697.684053] ? __switch_to_asm+0x40/0x70 [ 697.688142] ? __switch_to_asm+0x34/0x70 [ 697.692242] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 697.697122] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 697.702332] RIP: 0033:0x456987 [ 697.702350] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 697.702360] RSP: 002b:00007f9f77a49a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 697.702376] RAX: ffffffffffffffda RBX: 00000000200002d0 RCX: 0000000000456987 21:58:55 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660, 0x3f000000], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 697.702386] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 697.702396] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 697.702406] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 697.702416] R13: 0000000000000000 R14: 00000000004d8320 R15: 0000000000000003 21:58:55 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x100020, &(0x7f00000001c0)=ANY=[@ANYBLOB="7374726970653d30783030ffff0000303030303030303030302c6171746f5f64615f616c6c6f633d3078300600303030303030303030303066662c6f726c6f762c00"]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x80000, 0x1b8) getsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000240)=0x800, &(0x7f0000000280)=0x2) inotify_add_watch(r0, &(0x7f0000000380)='./file0\x00', 0x1002b) ioctl$KVM_S390_INTERRUPT_CPU(r0, 0x4010ae94, &(0x7f00000002c0)={0x400000000911, 0x1, 0x3}) 21:58:55 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'deb*g_want_extra_isize'}}]}) 21:58:55 executing program 3 (fault-call:0 fault-nth:25): syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:58:55 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:55 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f00000015c0)=[{&(0x7f0000000500)="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", 0x186, 0x7a}]) 21:58:55 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660, 0x7802], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:55 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000040)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)) [ 698.051312] FAULT_INJECTION: forcing a failure. [ 698.051312] name failslab, interval 1, probability 0, space 0, times 0 [ 698.071844] CPU: 0 PID: 5939 Comm: syz-executor3 Not tainted 4.19.0+ #92 [ 698.078721] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 698.088085] Call Trace: [ 698.088148] dump_stack+0x244/0x39d [ 698.088172] ? dump_stack_print_info.cold.1+0x20/0x20 [ 698.088190] ? mark_held_locks+0x130/0x130 [ 698.088217] should_fail.cold.4+0xa/0x17 [ 698.088237] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 698.088252] ? mark_held_locks+0x130/0x130 [ 698.088266] ? __lock_acquire+0x62f/0x4c20 [ 698.088287] ? mark_held_locks+0x130/0x130 [ 698.088307] ? zap_class+0x640/0x640 [ 698.088321] ? zap_class+0x640/0x640 [ 698.088339] ? mark_held_locks+0x130/0x130 [ 698.088358] ? lockdep_init_map+0x9/0x10 [ 698.141885] ? debug_mutex_init+0x2d/0x60 [ 698.146075] ? __lock_is_held+0xb5/0x140 [ 698.150168] ? sctp_sf_tabort_8_4_8.isra.35+0x3d8/0x430 [ 698.155572] ? find_held_lock+0x36/0x1c0 [ 698.159660] ? perf_trace_sched_process_exec+0x860/0x860 [ 698.165147] __should_failslab+0x124/0x180 [ 698.169413] should_failslab+0x9/0x14 [ 698.173236] __kmalloc_track_caller+0x2d1/0x760 [ 698.177925] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 698.183225] ? rcu_softirq_qs+0x20/0x20 [ 698.187228] ? smack_inode_init_security+0x32e/0x630 [ 698.192359] kstrdup+0x39/0x70 [ 698.195577] smack_inode_init_security+0x32e/0x630 [ 698.200542] security_inode_init_security+0x15d/0x3d0 [ 698.205756] ? ext4_init_acl+0x3a0/0x3a0 [ 698.209864] ? unregister_lsm_notifier+0x20/0x20 [ 698.214642] ? ext4_init_acl+0x1e6/0x3a0 [ 698.218732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 698.224317] ? check_preemption_disabled+0x48/0x280 [ 698.229646] ext4_init_security+0x34/0x40 [ 698.233845] __ext4_new_inode+0x4a61/0x65a0 [ 698.238214] ? ext4_free_inode+0x1a10/0x1a10 [ 698.242651] ? find_held_lock+0x36/0x1c0 [ 698.246747] ? is_bpf_text_address+0xac/0x170 [ 698.251296] ? lock_downgrade+0x900/0x900 [ 698.255469] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 698.260424] ? kasan_check_read+0x11/0x20 [ 698.264595] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 698.269895] ? rcu_softirq_qs+0x20/0x20 [ 698.273892] ? rcu_softirq_qs+0x20/0x20 [ 698.277951] ? unwind_dump+0x190/0x190 [ 698.281874] ? is_bpf_text_address+0xd3/0x170 [ 698.286396] ? kernel_text_address+0x79/0xf0 [ 698.290842] ? __kernel_text_address+0xd/0x40 [ 698.295360] ? unwind_get_return_address+0x61/0xa0 [ 698.300547] ? __save_stack_trace+0x8d/0xf0 [ 698.304953] ? smk_access+0x53b/0x700 [ 698.308818] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 698.314389] ? smack_log+0x423/0x590 [ 698.318129] ? smk_access_entry+0x310/0x310 [ 698.322475] ? print_usage_bug+0xc0/0xc0 [ 698.326557] ? __x64_sys_mkdir+0x5c/0x80 [ 698.330641] ? do_syscall_64+0x1b9/0x820 [ 698.334730] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 698.340127] ? smk_tskacc+0x3dd/0x520 [ 698.343957] ? trace_hardirqs_on+0x310/0x310 [ 698.348395] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 698.353954] ? __dquot_initialize+0x629/0xdd0 [ 698.358481] ? smack_privileged+0xd0/0xd0 [ 698.362660] ? dquot_get_next_dqblk+0x180/0x180 [ 698.367461] ext4_mkdir+0x2e1/0xe60 [ 698.371116] ? putname+0xf2/0x130 [ 698.374603] ? ext4_init_dot_dotdot+0x510/0x510 [ 698.379313] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 698.384878] ? security_inode_permission+0xd2/0x100 [ 698.389925] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 698.395486] ? security_inode_mkdir+0xe8/0x120 [ 698.395511] vfs_mkdir+0x42e/0x6b0 [ 698.395537] do_mkdirat+0x27a/0x310 [ 698.403802] ? __ia32_sys_mknod+0xb0/0xb0 [ 698.403824] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 698.403844] ? trace_hardirqs_off_caller+0x310/0x310 [ 698.403863] ? ksys_ioctl+0x81/0xd0 [ 698.425766] __x64_sys_mkdir+0x5c/0x80 [ 698.429708] do_syscall_64+0x1b9/0x820 [ 698.433626] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 698.439021] ? syscall_return_slowpath+0x5e0/0x5e0 [ 698.443986] ? trace_hardirqs_on_caller+0x310/0x310 [ 698.449044] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 698.454089] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 698.460807] ? __switch_to_asm+0x40/0x70 [ 698.464892] ? __switch_to_asm+0x34/0x70 [ 698.468981] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 698.473860] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 698.479072] RIP: 0033:0x456987 [ 698.482291] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 21:58:55 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660, 0x600], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:55 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 698.501215] RSP: 002b:00007f9f77a49a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 698.508948] RAX: ffffffffffffffda RBX: 00000000200002d0 RCX: 0000000000456987 [ 698.516238] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 698.523533] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 698.530832] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 698.538125] R13: 0000000000000000 R14: 00000000004d8320 R15: 0000000000000003 21:58:55 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 698.559683] Dev loop4: unable to read RDB block 1 [ 698.564607] loop4: unable to read partition table [ 698.575502] loop4: partition table beyond EOD, truncated 21:58:55 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660, 0x5], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:55 executing program 3 (fault-call:0 fault-nth:26): syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) [ 698.600513] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 21:58:55 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 698.704127] FAULT_INJECTION: forcing a failure. [ 698.704127] name failslab, interval 1, probability 0, space 0, times 0 [ 698.759585] CPU: 1 PID: 5962 Comm: syz-executor3 Not tainted 4.19.0+ #92 [ 698.766486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 698.775969] Call Trace: [ 698.775999] dump_stack+0x244/0x39d [ 698.776023] ? dump_stack_print_info.cold.1+0x20/0x20 [ 698.787451] ? mark_held_locks+0x130/0x130 [ 698.791716] should_fail.cold.4+0xa/0x17 [ 698.791739] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 698.800932] ? mark_held_locks+0x130/0x130 [ 698.805187] ? __lock_acquire+0x62f/0x4c20 [ 698.805208] ? mark_held_locks+0x130/0x130 [ 698.813693] ? zap_class+0x640/0x640 [ 698.817423] ? zap_class+0x640/0x640 [ 698.821162] ? mark_held_locks+0x130/0x130 [ 698.825417] ? lockdep_init_map+0x9/0x10 [ 698.829496] ? debug_mutex_init+0x2d/0x60 [ 698.833680] ? __lock_is_held+0xb5/0x140 [ 698.837802] ? find_held_lock+0x36/0x1c0 [ 698.841894] ? perf_trace_sched_process_exec+0x860/0x860 [ 698.847386] __should_failslab+0x124/0x180 [ 698.851646] should_failslab+0x9/0x14 [ 698.855471] __kmalloc_track_caller+0x2d1/0x760 [ 698.860161] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 698.865462] ? rcu_softirq_qs+0x20/0x20 [ 698.869466] ? smack_inode_init_security+0x32e/0x630 [ 698.874598] kstrdup+0x39/0x70 [ 698.877841] smack_inode_init_security+0x32e/0x630 [ 698.882824] security_inode_init_security+0x15d/0x3d0 [ 698.888039] ? ext4_init_acl+0x3a0/0x3a0 [ 698.892128] ? unregister_lsm_notifier+0x20/0x20 [ 698.896914] ? ext4_init_acl+0x1e6/0x3a0 [ 698.901012] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 698.906579] ? check_preemption_disabled+0x48/0x280 [ 698.911623] ext4_init_security+0x34/0x40 [ 698.915820] __ext4_new_inode+0x4a61/0x65a0 [ 698.920187] ? ext4_free_inode+0x1a10/0x1a10 [ 698.924622] ? find_held_lock+0x36/0x1c0 [ 698.928714] ? is_bpf_text_address+0xac/0x170 [ 698.933229] ? lock_downgrade+0x900/0x900 [ 698.937401] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 698.942355] ? kasan_check_read+0x11/0x20 [ 698.946529] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 698.951834] ? rcu_softirq_qs+0x20/0x20 [ 698.955843] ? rcu_softirq_qs+0x20/0x20 [ 698.959836] ? unwind_dump+0x190/0x190 [ 698.963754] ? is_bpf_text_address+0xd3/0x170 [ 698.968294] ? kernel_text_address+0x79/0xf0 [ 698.972726] ? __kernel_text_address+0xd/0x40 [ 698.977246] ? unwind_get_return_address+0x61/0xa0 [ 698.982201] ? __save_stack_trace+0x8d/0xf0 [ 698.986556] ? smk_access+0x53b/0x700 [ 698.990389] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 698.995946] ? smack_log+0x423/0x590 [ 698.999685] ? smk_access_entry+0x310/0x310 [ 699.004029] ? print_usage_bug+0xc0/0xc0 [ 699.008106] ? __x64_sys_mkdir+0x5c/0x80 [ 699.012188] ? do_syscall_64+0x1b9/0x820 [ 699.016271] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 699.021662] ? smk_tskacc+0x3dd/0x520 [ 699.025479] ? trace_hardirqs_on+0x310/0x310 [ 699.029919] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 699.035475] ? __dquot_initialize+0x629/0xdd0 [ 699.040001] ? smack_privileged+0xd0/0xd0 [ 699.044179] ? dquot_get_next_dqblk+0x180/0x180 [ 699.048889] ext4_mkdir+0x2e1/0xe60 [ 699.052552] ? putname+0xf2/0x130 [ 699.056039] ? ext4_init_dot_dotdot+0x510/0x510 [ 699.060737] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 699.066322] ? security_inode_permission+0xd2/0x100 [ 699.071369] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 699.076923] ? security_inode_mkdir+0xe8/0x120 [ 699.081543] vfs_mkdir+0x42e/0x6b0 [ 699.085108] do_mkdirat+0x27a/0x310 [ 699.088760] ? __ia32_sys_mknod+0xb0/0xb0 [ 699.092962] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 699.098353] ? trace_hardirqs_off_caller+0x310/0x310 [ 699.103477] ? ksys_ioctl+0x81/0xd0 [ 699.107128] __x64_sys_mkdir+0x5c/0x80 [ 699.111036] do_syscall_64+0x1b9/0x820 [ 699.114947] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 699.120336] ? syscall_return_slowpath+0x5e0/0x5e0 [ 699.125290] ? trace_hardirqs_on_caller+0x310/0x310 [ 699.130330] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 699.135369] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 699.142064] ? __switch_to_asm+0x40/0x70 [ 699.146145] ? __switch_to_asm+0x34/0x70 [ 699.150232] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 699.155106] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 699.160314] RIP: 0033:0x456987 [ 699.163529] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 699.182456] RSP: 002b:00007f9f77a49a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 699.190185] RAX: ffffffffffffffda RBX: 00000000200002d0 RCX: 0000000000456987 [ 699.197469] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 699.204757] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 699.212063] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 699.219347] R13: 0000000000000000 R14: 00000000004d8320 R15: 0000000000000003 [ 699.240459] EXT4-fs: 14 callbacks suppressed [ 699.240472] EXT4-fs (sda1): Unrecognized mount option "deb*g_want_extra_isize=0x0000000000000000" or missing value 21:58:56 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debdg_want_extra_isize'}}]}) 21:58:56 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f00000015c0)=[{&(0x7f0000000500)="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", 0x185, 0x7a}]) 21:58:56 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f00000007c0)={&(0x7f0000000040)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, 0x447, &(0x7f0000000740)=[{&(0x7f0000000280)=""/232, 0xe8}, {&(0x7f0000000380)=""/237, 0xed}, {&(0x7f0000000480)=""/161, 0xa1}, {&(0x7f0000000780)=""/51, 0x33}], 0x4, &(0x7f00000005c0)=""/92, 0x5c, 0x20}, 0x2001) getpeername$unix(r0, &(0x7f0000000800)=@abs, &(0x7f0000000640)=0x34e) r1 = syz_open_dev$vcsn(&(0x7f0000000540)='/dev/vcs#\x00', 0x1, 0x2002) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000680)={0x7, &(0x7f0000000580)=[{}, {}, {0x0}, {}, {}, {}, {}]}) sendmsg$kcm(r1, &(0x7f0000001c80)={0x0, 0x0, &(0x7f0000001b00)=[{&(0x7f00000008c0)="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", 0x1000}, {&(0x7f00000018c0)="238102d694cd10a9042cab0700e52c8d16b47f74973596d98705eed58ad7e6406c9f8486b9cfcc56f72c5039927c243af05c7fb7b23e4eeb4624fdaf1a353145391d4e502df2e01392875defd65d9d038b5b5a75dfcaf9a1f1f60645cbc25dcd815ddb9342d6935c7d99a425940e2ad2ad622cd88386256a42e0af318ba529686024a1e09e6f2f11ff0fe9dc04009212173c541c06ef974ec0fb16d8268c8818d0362efa38f20ac4717713afd442a23c2cd12ef0", 0xb4}, {&(0x7f0000001980)="535380767882e7918bf47bae244e4fea1019b60d44daaf5095a3f7870610fd5e5ebed7b89c0af89abcb719ee6173efc6b47c5c0f6ef52cdaf3bb24d23fc19eebfbb4f52fa1cb5e0ecd407a4f9da5063b1a3295c47ea8282f5895e36cb027", 0x5e}, {&(0x7f0000001a00)="bb070a89d93666568fddbc52217074b4ec71caff70e86c41b30d03593ac02df41b6146ecbb55e11677d6e651cb95dd1754faf37d2b9106422eaac16a60622c156b786db794deee736e0fb8293096314f4363baca8822fe285147c671c182ebcd7b9b15c08ee3986c3a62a1560fa702a44ab6195990365140960eaaf4e3866c3135d902a5913357275d16705de552e8c2b263e9f3b7ed3ff5710fd815d63f226a25484e8cb34cd48783b5c5274b0045a4973dcf818062", 0xb6}, {&(0x7f0000001ac0)="1609f0c7", 0x4}], 0x5, &(0x7f0000001b80)=[{0xd8, 0x105, 0x0, "7327c81eb2e8d42abc091d729c89d520b198f479b5b2934371e5bb16d11d930ef87ed472ed0dba79cfd4544096973ea26deaaf7e52340a5585b48a4643853275f10fedee15c7395f652a3865128f14fa3cd9de61cd0384288d5ce4c2b80680c2ccacd1a02d0125cc5079dbc50a26d9bb5e929c187105dae1bfcf9a4629c331805538710b304216806e9dc16c0427ee84505ec770b854323945a26e626bc8d6ce80418ed9e2f9cbd4a73db21e89c8ba1a53945e9249c84865348fc27b8a5de55ed8e7c3"}], 0xd8, 0x8015}, 0x0) ioctl$DRM_IOCTL_GET_SAREA_CTX(r1, 0xc010641d, &(0x7f0000000880)={r2, &(0x7f00000006c0)=""/117}) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f00000001c0)=ANY=[@ANYBLOB="08de028acd1e0b94b54a87a97f16d75e2fafa965804ab049655603a0a370d6784843f98b0d6f3f819773b14b093bac97993aca46770d67863f81198757a820b651a10af8e5f900920e1d922f1e2569423dcb2019040e558c12393eaeeedd5a68a116ef05dd1c6e64536116a556543afaa6281037a3df48d6561cff1855b3f93cc95efbf81190548cca3742c21b530fed78572423fdc684ab73269cd6416a8380e9093b61c46b00d619"]) 21:58:56 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660, 0x11], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:56 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:56 executing program 3 (fault-call:0 fault-nth:27): syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) [ 699.393658] FAULT_INJECTION: forcing a failure. [ 699.393658] name failslab, interval 1, probability 0, space 0, times 0 [ 699.416943] EXT4-fs (sda1): Unrecognized mount option "ÞŠÍ ”µJ‡©×^/¯©e€J°IeV £pÖxHCù‹ o?—s±K ;¬—™:ÊFw g†?‡W¨ ¶Q¡ [ 699.416943] øåù" or missing value [ 699.432334] CPU: 0 PID: 5978 Comm: syz-executor3 Not tainted 4.19.0+ #92 [ 699.439219] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 699.448598] Call Trace: [ 699.451220] dump_stack+0x244/0x39d [ 699.454888] ? dump_stack_print_info.cold.1+0x20/0x20 [ 699.460104] ? zap_class+0x640/0x640 [ 699.460124] ? print_usage_bug+0xc0/0xc0 [ 699.460148] should_fail.cold.4+0xa/0x17 [ 699.460169] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 699.460187] ? smack_privileged+0xd0/0xd0 [ 699.460209] ? walk_component+0x3fe/0x2590 [ 699.468002] ? find_held_lock+0x36/0x1c0 [ 699.468031] ? zap_class+0x640/0x640 [ 699.468056] ? mark_held_locks+0x130/0x130 [ 699.468078] ? smk_curacc+0x7f/0xa0 [ 699.501368] ? find_held_lock+0x36/0x1c0 [ 699.505469] ? __lock_is_held+0xb5/0x140 [ 699.509576] ? perf_trace_sched_process_exec+0x860/0x860 [ 699.515076] __should_failslab+0x124/0x180 [ 699.519349] should_failslab+0x9/0x14 [ 699.523173] kmem_cache_alloc+0x2be/0x730 [ 699.527359] __d_alloc+0xc8/0xb90 [ 699.530849] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 699.535900] ? d_alloc_parallel+0x1f40/0x1f40 [ 699.540421] ? d_lookup+0x255/0x300 21:58:56 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 699.544081] ? d_lookup+0x255/0x300 [ 699.547745] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 699.552392] ? lookup_dcache+0x22/0x140 [ 699.556393] ? trace_hardirqs_off_caller+0x310/0x310 [ 699.561541] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 699.566589] d_alloc+0x96/0x380 [ 699.569893] ? __d_lookup+0x9e0/0x9e0 [ 699.573721] ? __d_alloc+0xb90/0xb90 [ 699.577470] __lookup_hash+0xd9/0x190 [ 699.581296] filename_create+0x1e5/0x5b0 [ 699.585387] ? kern_path_mountpoint+0x40/0x40 [ 699.589910] ? fget_raw+0x20/0x20 [ 699.593398] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 699.598962] ? getname_flags+0x26e/0x590 [ 699.603057] do_mkdirat+0xda/0x310 [ 699.606632] ? __ia32_sys_mknod+0xb0/0xb0 [ 699.610825] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 699.616221] ? trace_hardirqs_off_caller+0x310/0x310 [ 699.621352] ? ksys_ioctl+0x81/0xd0 [ 699.625007] __x64_sys_mkdir+0x5c/0x80 [ 699.628970] do_syscall_64+0x1b9/0x820 [ 699.632891] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 699.638284] ? syscall_return_slowpath+0x5e0/0x5e0 [ 699.643247] ? trace_hardirqs_on_caller+0x310/0x310 [ 699.648292] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 699.653338] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 699.660042] ? __switch_to_asm+0x40/0x70 [ 699.664134] ? __switch_to_asm+0x34/0x70 [ 699.668225] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 699.673103] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 699.678312] RIP: 0033:0x456987 21:58:57 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 699.681530] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 699.700466] RSP: 002b:00007f9f77a49a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 699.708208] RAX: ffffffffffffffda RBX: 00000000200002d0 RCX: 0000000000456987 [ 699.715505] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 699.722821] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 699.730180] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 699.737466] R13: 0000000000000000 R14: 00000000004d8320 R15: 0000000000000003 21:58:57 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x2, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:57 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:57 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f00000015c0)=[{&(0x7f0000000500)="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", 0x185, 0x7a}]) 21:58:57 executing program 3 (fault-call:0 fault-nth:28): syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) [ 699.823372] EXT4-fs (sda1): Unrecognized mount option "ÞŠÍ ”µJ‡©×^/¯©e€J°IeV £pÖxHCù‹ o?—s±K ;¬—™:ÊFw g†?‡W¨ ¶Q¡ [ 699.823372] øåù" or missing value [ 699.889846] EXT4-fs (sda1): Unrecognized mount option "debdg_want_extra_isize=0x0000000000000000" or missing value [ 699.937515] FAULT_INJECTION: forcing a failure. [ 699.937515] name failslab, interval 1, probability 0, space 0, times 0 [ 699.955269] CPU: 1 PID: 6003 Comm: syz-executor3 Not tainted 4.19.0+ #92 [ 699.962164] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 699.971558] Call Trace: [ 699.974188] dump_stack+0x244/0x39d [ 699.977851] ? dump_stack_print_info.cold.1+0x20/0x20 [ 699.983073] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 699.988649] should_fail.cold.4+0xa/0x17 [ 699.992741] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 699.997909] ? __find_get_block+0x3be/0xf20 [ 700.002253] ? zap_class+0x640/0x640 [ 700.005996] ? __lock_is_held+0xb5/0x140 [ 700.010094] ? __lock_is_held+0xb5/0x140 [ 700.014187] ? perf_trace_sched_process_exec+0x860/0x860 [ 700.019670] ? __might_sleep+0x95/0x190 [ 700.023671] ? perf_trace_sched_process_exec+0x860/0x860 [ 700.029148] ? __getblk_gfp+0x11b/0xd50 [ 700.033156] __should_failslab+0x124/0x180 [ 700.037421] should_failslab+0x9/0x14 [ 700.041247] __kmalloc+0x2e0/0x760 [ 700.044836] ? is_bpf_text_address+0xac/0x170 [ 700.049365] ? ext4_xattr_block_set+0xa94/0x4490 [ 700.054151] ? check_preemption_disabled+0x48/0x280 [ 700.059196] ext4_xattr_block_set+0xa94/0x4490 [ 700.063823] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 700.069123] ? rcu_softirq_qs+0x20/0x20 [ 700.073121] ? zap_class+0x640/0x640 [ 700.076872] ? is_bpf_text_address+0xd3/0x170 [ 700.081410] ? ext4_xattr_ibody_set+0x2b0/0x2b0 [ 700.086111] ? __lock_is_held+0xb5/0x140 [ 700.090210] ? perf_trace_sched_process_exec+0x860/0x860 [ 700.095692] ? ext4_journalled_invalidatepage+0x50/0x50 [ 700.101090] ? __might_sleep+0x95/0x190 [ 700.105095] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 700.110653] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 700.116217] ? ext4_xattr_ibody_set+0x1da/0x2b0 [ 700.120910] ext4_xattr_set_handle+0xff4/0x1650 [ 700.125614] ? ext4_xattr_ibody_inline_set+0x2b0/0x2b0 [ 700.130919] ? __lock_is_held+0xb5/0x140 [ 700.135016] ? rcu_read_lock_sched_held+0x14f/0x180 [ 700.140056] ? __kmalloc_track_caller+0x5eb/0x760 [ 700.144928] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 700.150233] ? memcpy+0x45/0x50 [ 700.153551] ? kstrdup+0x59/0x70 [ 700.156949] ext4_initxattrs+0xbd/0x120 [ 700.161019] security_inode_init_security+0x1d1/0x3d0 [ 700.166232] ? ext4_init_acl+0x3a0/0x3a0 [ 700.170320] ? unregister_lsm_notifier+0x20/0x20 [ 700.175097] ? ext4_init_acl+0x1e6/0x3a0 [ 700.179192] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 700.184754] ? check_preemption_disabled+0x48/0x280 [ 700.189840] ext4_init_security+0x34/0x40 [ 700.194018] __ext4_new_inode+0x4a61/0x65a0 [ 700.198382] ? ext4_free_inode+0x1a10/0x1a10 [ 700.202836] ? find_held_lock+0x36/0x1c0 [ 700.206939] ? is_bpf_text_address+0xac/0x170 [ 700.211470] ? lock_downgrade+0x900/0x900 [ 700.215644] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 700.220601] ? kasan_check_read+0x11/0x20 [ 700.224796] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 700.230386] ? rcu_softirq_qs+0x20/0x20 [ 700.234383] ? rcu_softirq_qs+0x20/0x20 [ 700.238375] ? unwind_dump+0x190/0x190 [ 700.242296] ? is_bpf_text_address+0xd3/0x170 [ 700.246835] ? kernel_text_address+0x79/0xf0 [ 700.251265] ? __kernel_text_address+0xd/0x40 [ 700.255805] ? unwind_get_return_address+0x61/0xa0 [ 700.260763] ? __save_stack_trace+0x8d/0xf0 [ 700.265142] ? smk_access+0x53b/0x700 [ 700.268974] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 700.274538] ? smack_log+0x423/0x590 [ 700.278281] ? smk_access_entry+0x310/0x310 [ 700.282629] ? print_usage_bug+0xc0/0xc0 [ 700.286709] ? __x64_sys_mkdir+0x5c/0x80 [ 700.290817] ? do_syscall_64+0x1b9/0x820 [ 700.294905] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 700.300371] ? smk_tskacc+0x3dd/0x520 [ 700.304200] ? trace_hardirqs_on+0x310/0x310 [ 700.308632] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 700.314197] ? __dquot_initialize+0x629/0xdd0 [ 700.318722] ? smack_privileged+0xd0/0xd0 [ 700.322898] ? dquot_get_next_dqblk+0x180/0x180 [ 700.327614] ext4_mkdir+0x2e1/0xe60 [ 700.331269] ? putname+0xf2/0x130 [ 700.334757] ? ext4_init_dot_dotdot+0x510/0x510 [ 700.339480] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 700.345043] ? security_inode_permission+0xd2/0x100 [ 700.350092] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 700.355652] ? security_inode_mkdir+0xe8/0x120 [ 700.360270] vfs_mkdir+0x42e/0x6b0 [ 700.363957] do_mkdirat+0x27a/0x310 [ 700.367619] ? __ia32_sys_mknod+0xb0/0xb0 [ 700.371819] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 700.377212] ? trace_hardirqs_off_caller+0x310/0x310 [ 700.382342] ? ksys_ioctl+0x81/0xd0 [ 700.385997] __x64_sys_mkdir+0x5c/0x80 [ 700.389913] do_syscall_64+0x1b9/0x820 [ 700.393842] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 700.399232] ? syscall_return_slowpath+0x5e0/0x5e0 [ 700.404190] ? trace_hardirqs_on_caller+0x310/0x310 [ 700.409230] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 700.414271] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 700.420968] ? __switch_to_asm+0x40/0x70 [ 700.425053] ? __switch_to_asm+0x34/0x70 [ 700.429140] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 700.434043] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 700.439257] RIP: 0033:0x456987 [ 700.442475] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 700.461399] RSP: 002b:00007f9f77a49a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 700.469130] RAX: ffffffffffffffda RBX: 00000000200002d0 RCX: 0000000000456987 [ 700.476414] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 700.483703] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 700.490995] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 700.498284] R13: 0000000000000000 R14: 00000000004d8320 R15: 0000000000000003 [ 700.576650] EXT4-fs (sda1): Unrecognized mount option "debdg_want_extra_isize=0x0000000000000000" or missing value 21:58:57 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debxg_want_extra_isize'}}]}) 21:58:57 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x4000000000000000, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:57 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f00000001c0)=ANY=[@ANYBLOB="00a9b4b614bac0524da21beb699b9f03ca6ee39ade1f81eab08e49ae706a8784476f5a27aacbc327a6f6a85ff615e6a4c9ae8ad0a9c558b4d11eca62bf16dfadffac5048913643d3b8d058a4a3b9ea2dc64217b487f742a24b830623dd27c66e8432fcb665e035114563f1bdd5c09808424e2f340420ea3a0c3886ef6e4caded7fd5695dc4f51c2c7d756e2ca093dd2a13f31eba36d77eddd8"]) 21:58:57 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:57 executing program 3 (fault-call:0 fault-nth:29): syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:58:57 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f00000015c0)=[{&(0x7f0000000500)="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", 0x185, 0x7a}]) 21:58:58 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x1000000, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 700.718211] EXT4-fs (sda1): re-mounted. Opts: [ 700.723921] FAULT_INJECTION: forcing a failure. [ 700.723921] name failslab, interval 1, probability 0, space 0, times 0 [ 700.766894] CPU: 1 PID: 6017 Comm: syz-executor3 Not tainted 4.19.0+ #92 [ 700.773816] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 700.783190] Call Trace: [ 700.785838] dump_stack+0x244/0x39d [ 700.789495] ? dump_stack_print_info.cold.1+0x20/0x20 [ 700.794711] ? mark_held_locks+0x130/0x130 [ 700.798978] should_fail.cold.4+0xa/0x17 [ 700.803068] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 700.808192] ? mark_held_locks+0x130/0x130 [ 700.812450] ? __lock_acquire+0x62f/0x4c20 [ 700.816712] ? mark_held_locks+0x130/0x130 [ 700.820972] ? zap_class+0x640/0x640 [ 700.824701] ? zap_class+0x640/0x640 [ 700.828437] ? mark_held_locks+0x130/0x130 [ 700.832700] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 700.837486] ? __lock_is_held+0xb5/0x140 [ 700.841579] ? find_held_lock+0x36/0x1c0 [ 700.845660] ? perf_trace_sched_process_exec+0x860/0x860 [ 700.851139] __should_failslab+0x124/0x180 [ 700.855394] should_failslab+0x9/0x14 [ 700.859212] __kmalloc_track_caller+0x2d1/0x760 [ 700.863898] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 700.869191] ? rcu_softirq_qs+0x20/0x20 [ 700.873185] ? smack_inode_init_security+0x32e/0x630 [ 700.878306] kstrdup+0x39/0x70 [ 700.881516] smack_inode_init_security+0x32e/0x630 [ 700.886471] security_inode_init_security+0x15d/0x3d0 [ 700.891681] ? ext4_init_acl+0x3a0/0x3a0 [ 700.895755] ? unregister_lsm_notifier+0x20/0x20 [ 700.900527] ? ext4_init_acl+0x1e6/0x3a0 [ 700.904615] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 700.910172] ? check_preemption_disabled+0x48/0x280 [ 700.915211] ext4_init_security+0x34/0x40 [ 700.919377] __ext4_new_inode+0x4a61/0x65a0 [ 700.923727] ? ext4_free_inode+0x1a10/0x1a10 [ 700.928151] ? find_held_lock+0x36/0x1c0 [ 700.932236] ? is_bpf_text_address+0xac/0x170 [ 700.936749] ? lock_downgrade+0x900/0x900 [ 700.940921] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 700.945862] ? kasan_check_read+0x11/0x20 [ 700.950018] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 700.955303] ? rcu_softirq_qs+0x20/0x20 [ 700.959289] ? rcu_softirq_qs+0x20/0x20 [ 700.963271] ? unwind_dump+0x190/0x190 [ 700.967180] ? is_bpf_text_address+0xd3/0x170 [ 700.971688] ? kernel_text_address+0x79/0xf0 [ 700.976107] ? __kernel_text_address+0xd/0x40 [ 700.980613] ? unwind_get_return_address+0x61/0xa0 [ 700.985563] ? __save_stack_trace+0x8d/0xf0 [ 700.989903] ? smk_access+0x53b/0x700 [ 700.993727] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 700.999273] ? smack_log+0x423/0x590 [ 701.003004] ? smk_access_entry+0x310/0x310 [ 701.007334] ? print_usage_bug+0xc0/0xc0 [ 701.011401] ? __x64_sys_mkdir+0x5c/0x80 [ 701.015477] ? do_syscall_64+0x1b9/0x820 [ 701.019556] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 701.024942] ? smk_tskacc+0x3dd/0x520 [ 701.028752] ? trace_hardirqs_on+0x310/0x310 [ 701.033180] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 701.038728] ? __dquot_initialize+0x629/0xdd0 [ 701.043238] ? smack_privileged+0xd0/0xd0 [ 701.047402] ? dquot_get_next_dqblk+0x180/0x180 [ 701.052101] ext4_mkdir+0x2e1/0xe60 [ 701.055742] ? putname+0xf2/0x130 [ 701.059225] ? ext4_init_dot_dotdot+0x510/0x510 [ 701.063910] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 701.069461] ? security_inode_permission+0xd2/0x100 [ 701.074488] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 701.080035] ? security_inode_mkdir+0xe8/0x120 [ 701.084633] vfs_mkdir+0x42e/0x6b0 [ 701.088189] do_mkdirat+0x27a/0x310 [ 701.091835] ? __ia32_sys_mknod+0xb0/0xb0 [ 701.095995] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 701.101376] ? trace_hardirqs_off_caller+0x310/0x310 [ 701.106492] ? ksys_ioctl+0x81/0xd0 [ 701.110134] __x64_sys_mkdir+0x5c/0x80 [ 701.114034] do_syscall_64+0x1b9/0x820 [ 701.117938] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 701.123314] ? syscall_return_slowpath+0x5e0/0x5e0 [ 701.128259] ? trace_hardirqs_on_caller+0x310/0x310 [ 701.133285] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 701.138311] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 701.144989] ? __switch_to_asm+0x40/0x70 [ 701.149062] ? __switch_to_asm+0x34/0x70 [ 701.153142] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 701.158004] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 701.163200] RIP: 0033:0x456987 [ 701.166403] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 701.185312] RSP: 002b:00007f9f77a49a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 701.193027] RAX: ffffffffffffffda RBX: 00000000200002d0 RCX: 0000000000456987 [ 701.200298] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 701.207573] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 21:58:58 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 701.214847] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 701.222135] R13: 0000000000000000 R14: 00000000004d8320 R15: 0000000000000003 [ 701.263986] EXT4-fs (sda1): re-mounted. Opts: 21:58:58 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f00000015c0)=[{&(0x7f0000000500)="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", 0x186}]) 21:58:58 executing program 3 (fault-call:0 fault-nth:30): syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:58:58 executing program 1: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='\x00', 0x0, 0x2, &(0x7f00000002c0)=[{&(0x7f00000001c0)="07ca5889e7fef2db0d30e2a74b4027c7384ca05aa40417fbe1e441a5c0d37c5d2a1f31a92e0eaf1678cb3008406f82f54340b890fc1ec8965fae0be5e97175e644bcc690c69604aa341e", 0x4a, 0x8000}, {&(0x7f0000000240)="5eb7f1a2a5f23be1bde75a2d373d748332d7b53d0c0718bf649ed637173b188afdc7324a59e48b069df0b114b53d9ea0ff9078ea61d1d29ad92fcc284bbfa66f40be27d0226f252f031d4a", 0x4b, 0x27a94a60}], 0x200000, &(0x7f0000000340)={[{@sunit={'sunit', 0x3d, 0x7fff}}, {@biosize={'biosize', 0x3d, 0x4}}, {@logdev={'logdev', 0x3d, './file0'}}], [{@hash='hash'}, {@subj_user={'subj_user', 0x3d, 'em1:posix_acl_access+securityselfcgroup/vboxnet0self[selinux%em0md5sum#eth1[eth0]a&ppp1cpuseteth0--'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_role={'subj_role', 0x3d, ':posix_acl_access&%'}}, {@context={'context', 0x3d, 'user_u'}}]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)) [ 701.327085] EXT4-fs (sda1): Unrecognized mount option "debxg_want_extra_isize=0x0000000000000000" or missing value 21:58:58 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 701.393719] FAULT_INJECTION: forcing a failure. [ 701.393719] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 701.405579] CPU: 1 PID: 6035 Comm: syz-executor3 Not tainted 4.19.0+ #92 [ 701.412424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 701.421790] Call Trace: [ 701.424397] dump_stack+0x244/0x39d [ 701.428044] ? dump_stack_print_info.cold.1+0x20/0x20 [ 701.433266] should_fail.cold.4+0xa/0x17 [ 701.437356] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 701.442482] ? trace_hardirqs_on+0xbd/0x310 [ 701.446822] ? kasan_check_read+0x11/0x20 [ 701.450988] ? finish_task_switch+0x1f4/0x910 [ 701.455498] ? print_usage_bug+0xc0/0xc0 [ 701.459578] ? print_usage_bug+0xc0/0xc0 [ 701.463657] ? check_preemption_disabled+0x48/0x280 [ 701.468684] ? zap_class+0x640/0x640 [ 701.472407] ? check_preemption_disabled+0x48/0x280 [ 701.477444] ? zap_class+0x640/0x640 [ 701.481178] ? check_preemption_disabled+0x48/0x280 [ 701.486214] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 701.491764] ? should_fail+0x22d/0xd01 [ 701.495681] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 701.500814] __alloc_pages_nodemask+0x34b/0xde0 [ 701.505502] ? __alloc_pages_slowpath+0x2e10/0x2e10 [ 701.510549] ? __lock_is_held+0xb5/0x140 [ 701.514639] ? perf_trace_sched_process_exec+0x860/0x860 [ 701.520123] ? trace_hardirqs_off+0xb8/0x310 [ 701.524555] cache_grow_begin+0xa5/0x8c0 [ 701.528719] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 701.534276] ? check_preemption_disabled+0x48/0x280 [ 701.539310] __kmalloc+0x69e/0x760 [ 701.542878] ? ext4_xattr_block_set+0xa94/0x4490 [ 701.547650] ext4_xattr_block_set+0xa94/0x4490 [ 701.552246] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 701.557544] ? rcu_softirq_qs+0x20/0x20 [ 701.561532] ? zap_class+0x640/0x640 [ 701.565277] ? is_bpf_text_address+0xd3/0x170 [ 701.569801] ? ext4_xattr_ibody_set+0x2b0/0x2b0 [ 701.574492] ? __lock_is_held+0xb5/0x140 [ 701.578587] ? perf_trace_sched_process_exec+0x860/0x860 [ 701.584064] ? ext4_journalled_invalidatepage+0x50/0x50 [ 701.589446] ? __might_sleep+0x95/0x190 [ 701.593442] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 701.598997] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 701.604552] ? ext4_xattr_ibody_set+0x1da/0x2b0 [ 701.609245] ext4_xattr_set_handle+0xff4/0x1650 [ 701.613937] ? ext4_xattr_ibody_inline_set+0x2b0/0x2b0 [ 701.619235] ? __lock_is_held+0xb5/0x140 [ 701.623321] ? rcu_read_lock_sched_held+0x14f/0x180 [ 701.628349] ? __kmalloc_track_caller+0x5eb/0x760 [ 701.633205] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 701.638503] ? memcpy+0x45/0x50 [ 701.641814] ? kstrdup+0x59/0x70 [ 701.645196] ext4_initxattrs+0xbd/0x120 [ 701.649192] security_inode_init_security+0x1d1/0x3d0 [ 701.654392] ? ext4_init_acl+0x3a0/0x3a0 [ 701.658500] ? unregister_lsm_notifier+0x20/0x20 [ 701.663274] ? ext4_init_acl+0x1e6/0x3a0 [ 701.667358] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 701.672910] ? check_preemption_disabled+0x48/0x280 [ 701.677943] ext4_init_security+0x34/0x40 [ 701.682110] __ext4_new_inode+0x4a61/0x65a0 [ 701.686466] ? ext4_free_inode+0x1a10/0x1a10 [ 701.690892] ? find_held_lock+0x36/0x1c0 [ 701.694980] ? is_bpf_text_address+0xac/0x170 [ 701.699485] ? lock_downgrade+0x900/0x900 [ 701.703648] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 701.708592] ? kasan_check_read+0x11/0x20 [ 701.712750] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 701.718045] ? rcu_softirq_qs+0x20/0x20 [ 701.722029] ? rcu_softirq_qs+0x20/0x20 [ 701.726014] ? unwind_dump+0x190/0x190 [ 701.729925] ? is_bpf_text_address+0xd3/0x170 [ 701.734438] ? kernel_text_address+0x79/0xf0 [ 701.738863] ? __kernel_text_address+0xd/0x40 [ 701.743370] ? unwind_get_return_address+0x61/0xa0 [ 701.748311] ? __save_stack_trace+0x8d/0xf0 [ 701.752653] ? smk_access+0x53b/0x700 [ 701.756475] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 701.762023] ? smack_log+0x423/0x590 [ 701.765755] ? smk_access_entry+0x310/0x310 [ 701.770103] ? print_usage_bug+0xc0/0xc0 [ 701.774175] ? __x64_sys_mkdir+0x5c/0x80 [ 701.778245] ? do_syscall_64+0x1b9/0x820 [ 701.782322] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 701.787708] ? smk_tskacc+0x3dd/0x520 [ 701.791520] ? trace_hardirqs_on+0x310/0x310 [ 701.795948] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 701.801495] ? __dquot_initialize+0x629/0xdd0 [ 701.806011] ? smack_privileged+0xd0/0xd0 [ 701.810175] ? dquot_get_next_dqblk+0x180/0x180 [ 701.814875] ext4_mkdir+0x2e1/0xe60 [ 701.818517] ? putname+0xf2/0x130 [ 701.821998] ? ext4_init_dot_dotdot+0x510/0x510 [ 701.826685] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 701.832234] ? security_inode_permission+0xd2/0x100 [ 701.837262] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 701.842820] ? security_inode_mkdir+0xe8/0x120 [ 701.847422] vfs_mkdir+0x42e/0x6b0 [ 701.850977] do_mkdirat+0x27a/0x310 [ 701.854618] ? __ia32_sys_mknod+0xb0/0xb0 [ 701.858796] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 701.864182] ? trace_hardirqs_off_caller+0x310/0x310 [ 701.869302] ? ksys_ioctl+0x81/0xd0 [ 701.872951] __x64_sys_mkdir+0x5c/0x80 [ 701.876854] do_syscall_64+0x1b9/0x820 [ 701.880759] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 701.886142] ? syscall_return_slowpath+0x5e0/0x5e0 [ 701.891085] ? trace_hardirqs_on_caller+0x310/0x310 [ 701.896109] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 701.901133] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 701.907816] ? __switch_to_asm+0x40/0x70 [ 701.911888] ? __switch_to_asm+0x34/0x70 [ 701.915962] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 701.920830] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 701.926057] RIP: 0033:0x456987 [ 701.929263] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 701.948175] RSP: 002b:00007f9f77a49a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 701.955898] RAX: ffffffffffffffda RBX: 00000000200002d0 RCX: 0000000000456987 [ 701.963166] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 701.970441] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 701.977716] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 701.984995] R13: 0000000000000000 R14: 00000000004d8320 R15: 0000000000000003 [ 702.016278] EXT4-fs (sda1): Unrecognized mount option "debxg_want_extra_isize=0x0000000000000000" or missing value 21:58:59 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'deb0g_want_extra_isize'}}]}) 21:58:59 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f00000015c0)=[{&(0x7f0000000500)="f10457d357850ba96b3177c5432bf4d57c0df1e6e18ce27b33d45d2e44ea456be44eda49bb10e571862513b61f102eed99409fc67556483b021260a6f33dc13da1d50ddc83aa3a84a6f07efb3392e1a070fc93147c678e2c4902fd60a9f8022b1cd2f6cce4395660373a5d44cfb97743fa1936d10e0eca652e427449e026f4fc95277e2947ff7c23e8a9600b8d1f68338c57cab04985c591388803e6596d8bae0bd479bae6846d61e8fefe2551fc2e9859203159a172db93cf6c8c8f5905d602d33c5960cd9ee8105d2fa64f2dff6e70f20c95ec33e98d0588f3bfa4cf0f4b7110c203c2306b98360dc46505616c680611e12dff271a9918a3b8461ba1050bbbd417dbd8cfebe2d0098c84c96088389038c29083e639aca0781ec95d404510b103a582c1c888479ffe336ebd0ba87a1bf3d7420300fdf869e295b0e4e29d9700c930e48d202580b2acd201d0c54e13c7476a888fe6e77d03bb3caf8c17fde8efbf73696eee07a82dbe846b77433a1ecfa75200e5fa41dedc26dcd09bdcf7293e91c4e9671f86", 0x186}]) 21:58:59 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:58:59 executing program 3 (fault-call:0 fault-nth:31): syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) [ 702.185367] EXT4-fs (sda1): re-mounted. Opts: [ 702.216004] FAULT_INJECTION: forcing a failure. [ 702.216004] name failslab, interval 1, probability 0, space 0, times 0 [ 702.242142] CPU: 1 PID: 6054 Comm: syz-executor3 Not tainted 4.19.0+ #92 [ 702.249025] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 702.258462] Call Trace: [ 702.261066] dump_stack+0x244/0x39d [ 702.264706] ? dump_stack_print_info.cold.1+0x20/0x20 [ 702.269909] ? perf_trace_sched_process_exec+0x860/0x860 [ 702.269926] ? lock_downgrade+0x900/0x900 [ 702.269953] should_fail.cold.4+0xa/0x17 [ 702.269974] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 702.288709] ? block_commit_write+0x30/0x30 [ 702.293044] ? print_usage_bug+0xc0/0xc0 [ 702.297112] ? __ext4_handle_dirty_metadata+0x1e0/0x5a0 [ 702.302493] ? kasan_check_write+0x14/0x20 [ 702.306734] ? zap_class+0x640/0x640 [ 702.310483] ? __lock_is_held+0xb5/0x140 [ 702.314571] ? perf_trace_sched_process_exec+0x860/0x860 [ 702.320031] ? __lock_acquire+0x62f/0x4c20 [ 702.324278] __should_failslab+0x124/0x180 [ 702.328528] should_failslab+0x9/0x14 [ 702.332346] __kmalloc+0x2e0/0x760 [ 702.335902] ? ext4_find_extent+0x757/0x9b0 [ 702.340233] ext4_find_extent+0x757/0x9b0 [ 702.344397] ext4_ext_map_blocks+0x291/0x48f0 [ 702.348906] ? kasan_check_write+0x14/0x20 [ 702.353157] ? ext4_ext_release+0x10/0x10 [ 702.357321] ? zap_class+0x640/0x640 [ 702.361042] ? zap_class+0x640/0x640 [ 702.365231] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 702.370795] ? check_preemption_disabled+0x48/0x280 [ 702.375840] ? lock_acquire+0x1ed/0x520 [ 702.380379] ? ext4_map_blocks+0x487/0x1b50 [ 702.384712] ? lock_release+0xa00/0xa00 [ 702.388694] ? perf_trace_sched_process_exec+0x860/0x860 [ 702.394149] ? ext4_es_cache_extent+0x6a0/0x6a0 [ 702.398823] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 702.403764] ? kasan_check_read+0x11/0x20 [ 702.407928] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 702.413223] ? down_read+0x8d/0x120 [ 702.416858] ? ext4_map_blocks+0x487/0x1b50 [ 702.421206] ? __down_interruptible+0x700/0x700 [ 702.425889] ? kernel_text_address+0x79/0xf0 [ 702.430318] ext4_map_blocks+0xe2d/0x1b50 [ 702.434530] ? __save_stack_trace+0x8d/0xf0 [ 702.438880] ? ext4_issue_zeroout+0x190/0x190 [ 702.443391] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 702.448950] ext4_getblk+0x10e/0x630 [ 702.452677] ? ext4_iomap_begin+0x1390/0x1390 [ 702.457191] ? smk_tskacc+0x3dd/0x520 [ 702.461005] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 702.466557] ? __dquot_initialize+0x629/0xdd0 [ 702.471070] ext4_bread+0x95/0x2b0 [ 702.474625] ? ext4_getblk+0x630/0x630 [ 702.478530] ? dquot_get_next_dqblk+0x180/0x180 [ 702.483227] ext4_append+0x14e/0x370 [ 702.483254] ext4_mkdir+0x532/0xe60 [ 702.490590] ? putname+0xf2/0x130 [ 702.490618] ? ext4_init_dot_dotdot+0x510/0x510 [ 702.490642] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 702.490664] ? security_inode_permission+0xd2/0x100 [ 702.509318] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 702.514869] ? security_inode_mkdir+0xe8/0x120 [ 702.519467] vfs_mkdir+0x42e/0x6b0 [ 702.523026] do_mkdirat+0x27a/0x310 [ 702.526668] ? __ia32_sys_mknod+0xb0/0xb0 [ 702.530836] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 702.536211] ? trace_hardirqs_off_caller+0x310/0x310 [ 702.541323] ? ksys_ioctl+0x81/0xd0 [ 702.544962] __x64_sys_mkdir+0x5c/0x80 [ 702.548861] do_syscall_64+0x1b9/0x820 [ 702.552763] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 702.558148] ? syscall_return_slowpath+0x5e0/0x5e0 [ 702.563088] ? trace_hardirqs_on_caller+0x310/0x310 [ 702.568116] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 702.573142] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 702.579821] ? __switch_to_asm+0x40/0x70 [ 702.583894] ? __switch_to_asm+0x34/0x70 [ 702.587972] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 702.592834] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 702.598029] RIP: 0033:0x456987 21:58:59 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x7000000, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:58:59 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 702.601236] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 702.620141] RSP: 002b:00007f9f77a49a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 702.627856] RAX: ffffffffffffffda RBX: 00000000200002d0 RCX: 0000000000456987 [ 702.635129] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 702.642405] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 702.649680] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 702.656953] R13: 0000000000000000 R14: 00000000004d8320 R15: 0000000000000003 21:58:59 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f00000015c0)=[{&(0x7f0000000500)="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", 0x186}]) 21:59:00 executing program 3 (fault-call:0 fault-nth:32): syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:59:00 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0xff, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000380)) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x84, r1, 0x4, 0x70bd2b, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xe4}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x3}]}, @IPVS_CMD_ATTR_DEST={0x20, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@dev={0xfe, 0x80, [], 0xe}}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x7}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x999}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x21, 0x4}}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x3d}}]}]}, 0x84}}, 0x8800) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)=ANY=[@ANYBLOB="ce"]) 21:59:00 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 702.844732] FAULT_INJECTION: forcing a failure. [ 702.844732] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 702.856619] CPU: 0 PID: 6070 Comm: syz-executor3 Not tainted 4.19.0+ #92 [ 702.863461] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 702.872819] Call Trace: [ 702.875427] dump_stack+0x244/0x39d [ 702.879096] ? dump_stack_print_info.cold.1+0x20/0x20 [ 702.884320] should_fail.cold.4+0xa/0x17 [ 702.888402] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 702.893531] ? print_usage_bug+0xc0/0xc0 [ 702.897613] ? print_usage_bug+0xc0/0xc0 [ 702.901688] ? check_preemption_disabled+0x48/0x280 [ 702.906732] ? zap_class+0x640/0x640 [ 702.910506] ? check_preemption_disabled+0x48/0x280 [ 702.915557] ? zap_class+0x640/0x640 [ 702.919288] ? check_preemption_disabled+0x48/0x280 [ 702.924319] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 702.929871] ? should_fail+0x22d/0xd01 [ 702.933789] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 702.938923] __alloc_pages_nodemask+0x34b/0xde0 [ 702.943617] ? __alloc_pages_slowpath+0x2e10/0x2e10 [ 702.948647] ? __lock_is_held+0xb5/0x140 [ 702.952734] ? perf_trace_sched_process_exec+0x860/0x860 [ 702.958232] ? trace_hardirqs_off+0xb8/0x310 [ 702.962669] cache_grow_begin+0xa5/0x8c0 [ 702.966753] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 702.972317] ? check_preemption_disabled+0x48/0x280 [ 702.977354] __kmalloc+0x69e/0x760 [ 702.980912] ? ext4_xattr_block_set+0xa94/0x4490 [ 702.985684] ext4_xattr_block_set+0xa94/0x4490 [ 702.990281] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 21:59:00 executing program 4: socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000840)='.dead\x00', &(0x7f0000000880), &(0x7f0000000980)="230a9f39cc653f325ca55f5787", 0xd, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) mknod(&(0x7f0000000a00)='./file0\x00', 0x461, 0x0) execve(&(0x7f0000000100)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000540)='\x00'], &(0x7f00000002c0)) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vhost-vsock\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f00000001c0)={0x0, 0x6}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000300)={0x0, 0x0, 0x2, 0x7, 0x0, 0x0, 0x3, 0x8, {0x0, @in6={{0xa, 0x4e23, 0x40, @loopback, 0x1ff}}, 0x8, 0xffffffffffff0000, 0x8c6, 0xfffffffffffffffc, 0x57db7c58}}, &(0x7f0000000280)=0xb0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, &(0x7f0000000000)) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000480)={0x6, 0x0, 0x80000000, 0x0, 0x0, 0xfffffffffffff801, 0x1, 0x9, 0x7, 0x0, 0x5}) open(&(0x7f00000008c0)='./file0\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f000000ac80), 0x0, 0x0) 21:59:00 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 702.995602] ? rcu_softirq_qs+0x20/0x20 [ 702.999626] ? zap_class+0x640/0x640 [ 703.003364] ? is_bpf_text_address+0xd3/0x170 [ 703.007877] ? ext4_xattr_ibody_set+0x2b0/0x2b0 [ 703.012565] ? __lock_is_held+0xb5/0x140 [ 703.016654] ? perf_trace_sched_process_exec+0x860/0x860 [ 703.022127] ? ext4_journalled_invalidatepage+0x50/0x50 [ 703.027513] ? __might_sleep+0x95/0x190 [ 703.031508] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 703.037065] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 703.042611] ? ext4_xattr_ibody_set+0x1da/0x2b0 [ 703.047287] ext4_xattr_set_handle+0xff4/0x1650 [ 703.051972] ? ext4_xattr_ibody_inline_set+0x2b0/0x2b0 [ 703.057258] ? __lock_is_held+0xb5/0x140 [ 703.061336] ? rcu_read_lock_sched_held+0x14f/0x180 [ 703.066369] ? __kmalloc_track_caller+0x5eb/0x760 [ 703.071209] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 703.076496] ? memcpy+0x45/0x50 [ 703.079798] ? kstrdup+0x59/0x70 [ 703.083171] ext4_initxattrs+0xbd/0x120 [ 703.087161] security_inode_init_security+0x1d1/0x3d0 [ 703.092357] ? ext4_init_acl+0x3a0/0x3a0 [ 703.096420] ? unregister_lsm_notifier+0x20/0x20 [ 703.101179] ? ext4_init_acl+0x1e6/0x3a0 [ 703.105256] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 703.110806] ? check_preemption_disabled+0x48/0x280 [ 703.115833] ext4_init_security+0x34/0x40 [ 703.119989] __ext4_new_inode+0x4a61/0x65a0 [ 703.124331] ? ext4_free_inode+0x1a10/0x1a10 [ 703.128782] ? find_held_lock+0x36/0x1c0 [ 703.132863] ? is_bpf_text_address+0xac/0x170 [ 703.137362] ? lock_downgrade+0x900/0x900 [ 703.141520] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 703.146452] ? kasan_check_read+0x11/0x20 [ 703.150607] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 703.155885] ? rcu_softirq_qs+0x20/0x20 [ 703.159864] ? rcu_softirq_qs+0x20/0x20 [ 703.163839] ? unwind_dump+0x190/0x190 [ 703.167741] ? is_bpf_text_address+0xd3/0x170 [ 703.172254] ? kernel_text_address+0x79/0xf0 [ 703.176670] ? __kernel_text_address+0xd/0x40 [ 703.181169] ? unwind_get_return_address+0x61/0xa0 [ 703.186107] ? __save_stack_trace+0x8d/0xf0 [ 703.190443] ? smk_access+0x53b/0x700 [ 703.194253] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 703.199797] ? smack_log+0x423/0x590 [ 703.203520] ? smk_access_entry+0x310/0x310 [ 703.207850] ? print_usage_bug+0xc0/0xc0 [ 703.211917] ? __x64_sys_mkdir+0x5c/0x80 [ 703.215984] ? do_syscall_64+0x1b9/0x820 [ 703.220056] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 703.225452] ? smk_tskacc+0x3dd/0x520 [ 703.229264] ? trace_hardirqs_on+0x310/0x310 [ 703.233676] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 703.239215] ? __dquot_initialize+0x629/0xdd0 [ 703.243722] ? smack_privileged+0xd0/0xd0 [ 703.247891] ? dquot_get_next_dqblk+0x180/0x180 [ 703.252581] ext4_mkdir+0x2e1/0xe60 [ 703.256221] ? putname+0xf2/0x130 [ 703.259688] ? ext4_init_dot_dotdot+0x510/0x510 [ 703.264364] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 703.269905] ? security_inode_permission+0xd2/0x100 [ 703.274923] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 703.280460] ? security_inode_mkdir+0xe8/0x120 [ 703.285054] vfs_mkdir+0x42e/0x6b0 [ 703.288601] do_mkdirat+0x27a/0x310 [ 703.292235] ? __ia32_sys_mknod+0xb0/0xb0 [ 703.296391] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 703.301759] ? trace_hardirqs_off_caller+0x310/0x310 [ 703.306878] ? ksys_ioctl+0x81/0xd0 [ 703.310516] __x64_sys_mkdir+0x5c/0x80 [ 703.314428] do_syscall_64+0x1b9/0x820 [ 703.318330] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 703.323698] ? syscall_return_slowpath+0x5e0/0x5e0 [ 703.328630] ? trace_hardirqs_on_caller+0x310/0x310 [ 703.333654] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 703.338677] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 703.345351] ? __switch_to_asm+0x40/0x70 [ 703.349413] ? __switch_to_asm+0x34/0x70 [ 703.353484] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 703.358339] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 703.363768] RIP: 0033:0x456987 [ 703.367024] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 703.386509] RSP: 002b:00007f9f77a49a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 703.394222] RAX: ffffffffffffffda RBX: 00000000200002d0 RCX: 0000000000456987 [ 703.401493] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 703.408761] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 703.416055] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 703.423322] R13: 0000000000000000 R14: 00000000004d8320 R15: 0000000000000003 21:59:00 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'deb-g_want_extra_isize'}}]}) 21:59:00 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:00 executing program 3 (fault-call:0 fault-nth:33): syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:59:00 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x1f, 0x2, &(0x7f0000000280)=[{&(0x7f00000001c0)="f4604199b600cd242f85a717a036d07b282da48c831135187d8446081160e1e7436ed7010f8f88264324854a4dbb17fecc93d67067c4646ea48e56be0475a735c0b4e1a83fb914c7ac65e57b716b394cea4519b063941ee8ccf8bd5cbfc8570e7c67bc5238ec371ed6aed51d4b1300b53ca19b1fe833505198d214ded870746cfc719ba0bce5787b1bc01fe3c80d71693f99c43499c6c6b7376697f0e59476cf430729e7", 0xa4, 0xffffffff00000001}, {&(0x7f0000000340)="0f4861ae051e245eb60550f1b459668f474ba129349f261f1edcee853124a2d253262ea4a87229a6488bad62251cf362485649b4d958d809dfca3d569d0de52ea12e31652892a60cf86666e104693e99befbc4fe5ea8e9c0704b0b13b364f75c9c40a83267f4f8ce68b26f4bbbd10d449f71e4b83f096ef98dd1047b04a6571f8016685aaab689e0f10719905393adf3105c6e3a17ae4938cc59808f5f9517e2fb82435db47c942ed8530cd349478b548c", 0xb1, 0x200}], 0x2, &(0x7f0000000400)={[{@grpquota='grpquota'}, {@prjquota='prjquota'}, {@largeio='largeio'}, {@usrquota='usrquota'}, {@noikeep='noikeep'}], [{@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bpf\x00'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@context={'context', 0x3d, 'user_u'}}]}) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)) [ 703.874262] XFS (loop1): unknown mount option [rootcontext=unconfined_u]. [ 704.009699] XFS (loop1): unknown mount option [rootcontext=unconfined_u]. [ 704.172013] FAULT_INJECTION: forcing a failure. [ 704.172013] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 704.183867] CPU: 1 PID: 6095 Comm: syz-executor3 Not tainted 4.19.0+ #92 [ 704.190712] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 704.200067] Call Trace: [ 704.202670] dump_stack+0x244/0x39d [ 704.206314] ? dump_stack_print_info.cold.1+0x20/0x20 [ 704.211513] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 704.217065] ? mark_page_accessed+0xcaf/0x2040 [ 704.221663] should_fail.cold.4+0xa/0x17 [ 704.225733] ? print_usage_bug+0xc0/0xc0 [ 704.229964] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 704.235075] ? check_preemption_disabled+0x48/0x280 [ 704.240109] ? print_usage_bug+0xc0/0xc0 [ 704.244176] ? print_usage_bug+0xc0/0xc0 [ 704.248247] ? check_preemption_disabled+0x48/0x280 [ 704.253272] ? zap_class+0x640/0x640 [ 704.256990] ? check_preemption_disabled+0x48/0x280 [ 704.262024] ? zap_class+0x640/0x640 [ 704.265750] ? check_preemption_disabled+0x48/0x280 [ 704.270795] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 704.276338] ? should_fail+0x22d/0xd01 [ 704.280238] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 704.285359] __alloc_pages_nodemask+0x34b/0xde0 [ 704.290043] ? __alloc_pages_slowpath+0x2e10/0x2e10 [ 704.295071] ? __lock_is_held+0xb5/0x140 [ 704.299154] ? perf_trace_sched_process_exec+0x860/0x860 [ 704.304628] ? trace_hardirqs_off+0xb8/0x310 [ 704.309053] cache_grow_begin+0xa5/0x8c0 [ 704.313125] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 704.318674] ? check_preemption_disabled+0x48/0x280 [ 704.323704] __kmalloc+0x69e/0x760 [ 704.327257] ? ext4_xattr_block_set+0xa94/0x4490 [ 704.332029] ext4_xattr_block_set+0xa94/0x4490 [ 704.336617] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 704.341904] ? rcu_softirq_qs+0x20/0x20 [ 704.345895] ? zap_class+0x640/0x640 [ 704.349623] ? is_bpf_text_address+0xd3/0x170 [ 704.354136] ? ext4_xattr_ibody_set+0x2b0/0x2b0 [ 704.358822] ? __lock_is_held+0xb5/0x140 [ 704.363358] ? perf_trace_sched_process_exec+0x860/0x860 [ 704.368822] ? ext4_journalled_invalidatepage+0x50/0x50 [ 704.374197] ? __might_sleep+0x95/0x190 [ 704.378186] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 704.383733] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 704.389282] ? ext4_xattr_ibody_set+0x1da/0x2b0 [ 704.393964] ext4_xattr_set_handle+0xff4/0x1650 [ 704.399052] ? ext4_xattr_ibody_inline_set+0x2b0/0x2b0 [ 704.404345] ? __lock_is_held+0xb5/0x140 [ 704.408423] ? rcu_read_lock_sched_held+0x14f/0x180 [ 704.413450] ? __kmalloc_track_caller+0x5eb/0x760 [ 704.418296] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 704.423586] ? memcpy+0x45/0x50 [ 704.426879] ? kstrdup+0x59/0x70 [ 704.430259] ext4_initxattrs+0xbd/0x120 [ 704.434254] security_inode_init_security+0x1d1/0x3d0 [ 704.439448] ? ext4_init_acl+0x3a0/0x3a0 [ 704.443518] ? unregister_lsm_notifier+0x20/0x20 [ 704.448286] ? ext4_init_acl+0x1e6/0x3a0 [ 704.452366] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 704.457915] ? check_preemption_disabled+0x48/0x280 [ 704.462944] ext4_init_security+0x34/0x40 [ 704.467104] __ext4_new_inode+0x4a61/0x65a0 [ 704.471451] ? ext4_free_inode+0x1a10/0x1a10 [ 704.475876] ? find_held_lock+0x36/0x1c0 [ 704.479959] ? is_bpf_text_address+0xac/0x170 [ 704.484462] ? lock_downgrade+0x900/0x900 [ 704.488620] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 704.493566] ? kasan_check_read+0x11/0x20 [ 704.497723] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 704.503002] ? rcu_softirq_qs+0x20/0x20 [ 704.506980] ? rcu_softirq_qs+0x20/0x20 [ 704.510965] ? unwind_dump+0x190/0x190 [ 704.514876] ? is_bpf_text_address+0xd3/0x170 [ 704.519380] ? kernel_text_address+0x79/0xf0 [ 704.523803] ? __kernel_text_address+0xd/0x40 [ 704.528306] ? unwind_get_return_address+0x61/0xa0 [ 704.533250] ? __save_stack_trace+0x8d/0xf0 [ 704.537594] ? smk_access+0x53b/0x700 [ 704.541415] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 704.546959] ? smack_log+0x423/0x590 [ 704.550687] ? smk_access_entry+0x310/0x310 [ 704.555015] ? print_usage_bug+0xc0/0xc0 [ 704.559079] ? __x64_sys_mkdir+0x5c/0x80 [ 704.563146] ? do_syscall_64+0x1b9/0x820 [ 704.567220] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 704.572603] ? smk_tskacc+0x3dd/0x520 [ 704.576413] ? trace_hardirqs_on+0x310/0x310 [ 704.580831] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 704.586374] ? __dquot_initialize+0x629/0xdd0 [ 704.590887] ? smack_privileged+0xd0/0xd0 [ 704.595048] ? dquot_get_next_dqblk+0x180/0x180 [ 704.599745] ext4_mkdir+0x2e1/0xe60 [ 704.603398] ? putname+0xf2/0x130 [ 704.606868] ? ext4_init_dot_dotdot+0x510/0x510 [ 704.611563] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 704.617108] ? security_inode_permission+0xd2/0x100 [ 704.622138] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 704.627681] ? security_inode_mkdir+0xe8/0x120 [ 704.632278] vfs_mkdir+0x42e/0x6b0 [ 704.635832] do_mkdirat+0x27a/0x310 [ 704.639469] ? __ia32_sys_mknod+0xb0/0xb0 [ 704.643625] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 704.649003] ? trace_hardirqs_off_caller+0x310/0x310 [ 704.654115] ? ksys_ioctl+0x81/0xd0 [ 704.657749] __x64_sys_mkdir+0x5c/0x80 [ 704.661658] do_syscall_64+0x1b9/0x820 [ 704.665559] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 704.670930] ? syscall_return_slowpath+0x5e0/0x5e0 [ 704.675871] ? trace_hardirqs_on_caller+0x310/0x310 [ 704.680894] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 704.685920] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 704.692592] ? __switch_to_asm+0x40/0x70 [ 704.696660] ? __switch_to_asm+0x34/0x70 [ 704.700735] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 704.705593] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 704.710801] RIP: 0033:0x456987 [ 704.714004] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 704.732909] RSP: 002b:00007f9f77a49a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 704.740625] RAX: ffffffffffffffda RBX: 00000000200002d0 RCX: 0000000000456987 [ 704.747898] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 704.755169] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 704.762443] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 704.769715] R13: 0000000000000000 R14: 00000000004d8320 R15: 0000000000000003 21:59:04 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x1100, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:04 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:04 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'deb\ng_want_extra_isize'}}]}) 21:59:04 executing program 4: socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000840)='.dead\x00', &(0x7f0000000880), &(0x7f0000000980)="230a9f39cc653f325ca55f5787", 0xd, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) mknod(&(0x7f0000000a00)='./file0\x00', 0x461, 0x0) execve(&(0x7f0000000100)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000540)='\x00'], &(0x7f00000002c0)) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vhost-vsock\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f00000001c0)={0x0, 0x6}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000300)={0x0, 0x0, 0x2, 0x7, 0x0, 0x0, 0x3, 0x8, {0x0, @in6={{0xa, 0x4e23, 0x40, @loopback, 0x1ff}}, 0x8, 0xffffffffffff0000, 0x8c6, 0xfffffffffffffffc, 0x57db7c58}}, &(0x7f0000000280)=0xb0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, &(0x7f0000000000)) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000480)={0x6, 0x0, 0x80000000, 0x0, 0x0, 0xfffffffffffff801, 0x1, 0x9, 0x7, 0x0, 0x5}) open(&(0x7f00000008c0)='./file0\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f000000ac80), 0x0, 0x0) 21:59:04 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) socketpair(0x12, 0x4, 0x2, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r0, &(0x7f00000001c0), &(0x7f0000000240)=0x6e) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0xaaaace4, &(0x7f0000000700), 0x100000000100020, &(0x7f0000000040)) 21:59:04 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:59:04 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 706.992616] EXT4-fs: 6 callbacks suppressed [ 706.992630] EXT4-fs (sda1): Unrecognized mount option "deb [ 706.992630] g_want_extra_isize=0x0000000000000000" or missing value 21:59:04 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x278, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:04 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='%fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) [ 707.097985] EXT4-fs (sda1): Unrecognized mount option "deb [ 707.097985] g_want_extra_isize=0x0000000000000000" or missing value 21:59:04 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:04 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debu\n_want_extra_isize'}}]}) 21:59:04 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x100000000000000, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:04 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:04 executing program 4: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000804000)) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000280)={0x0, 0x0}) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 21:59:04 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x1100000000000000, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:04 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='j.s\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:59:04 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/audio\x00', 0x2000, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001700)={0x0, 0x0}, &(0x7f0000001740)=0xc) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x4, 0x4, &(0x7f0000001680)=[{&(0x7f00000003c0)="2e21497aef39e514c1529585f82e1dcdb56d924f4113c5cbaecf1fe2af4c90e949bc5e9c9f09067483d75546aa10bc15d9bb2b1d49eebb6bc82ff5d4a95161e2322b61e5496f5f73528d17183d94b5c4b921c86ada09c41383a2a2003a9406bd4a69122d7317031da6e25af533d2c5bf04908177a429591799eaf9eebd1d34b8d150ec965c25ef2f712cbecc37f7c97eba73de4264b5248880cdd289ef1f15c077acce71c1c207b59986dc5d30df6b90f18bf3e0fd35af7e8ecb4ec7ffec943bec50e2d6548f45ca3aa65374d68d7527b34cbdc8c12ae42b", 0xd8, 0x6}, {&(0x7f00000004c0)="65a3e994011d793e2b8540e1d20c2168429a5d664634088ff00bb4b001bfe7bed26aaeef114517dbeadce94f211ee1fef01f49ebdecc11e3dd517462e77710fccba9b23fb46757db840cbd1407a76b5adf36e17e8cc3e7fd2cb35f0e7c8b74944f7dfa7b7c2c643a3204deb0498541d850c5b723cc62abc1664d0678029599646a17fff4e2a1d4b3182ebfface110c756871317f3c43e1814a205adf78a1ec3d47d372903765b670f8add97c68541d0b02663a052d1d7c6baafd42defef5d60ea4b1ff895630e243770fd1166d70675a6bb91f3aa370ff3b36409e19416e6f4b6dc2", 0xe2, 0xc1b8}, {&(0x7f00000005c0)="eec037d825b6a188b81c163bbb4a77804d681d82f19b52cd67bb18c523ea055947b84d539802a3feb0f7e250ede6330a790b601ccd509b3d77f6ad34b31d68bf4e81a55fcb45b4737bdf6194d984a0b7c8157079360fd7e01a68c03b38b442659bb37f132c5f07eade5f37e199e9d93e1e0e569993aa0ae7c7e2965734f7a5823b8e39dde144c4258cacca91bd51592afad31907720e31120547bf83b9e28c7030b36619d7aa4f35f567a061e84ea2aa1a", 0xb1}, {&(0x7f0000000680)="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", 0xffffffffffffffbd, 0x1000}], 0x0, &(0x7f0000001780)={[{@grpquota='grpquota'}, {@resize='resize'}, {@quota='quota'}, {@uid={'uid', 0x3d, r1}}], [{@pcr={'pcr', 0x3d, 0x26}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x37, 0x39, 0x38, 0x32, 0x36, 0x65, 0x36], 0x2d, [0x0, 0x33, 0x32, 0x35], 0x2d, [0x3f, 0x36, 0x75, 0x73], 0x2d, [0x77, 0x38, 0x38, 0x37], 0x2d, [0x62, 0x37, 0x0, 0x64, 0x37, 0x38, 0x0, 0x77]}}}]}) write$P9_RXATTRCREATE(r0, &(0x7f00000018c0)={0x7, 0x21, 0x1}, 0x7) rt_sigprocmask(0x1, &(0x7f0000001840)={0x4}, &(0x7f0000001880), 0x8) readahead(r0, 0x2, 0xfffffffffffffff8) openat$tun(0xffffffffffffff9c, &(0x7f0000001800)='/dev/net/tun\x00', 0x101000, 0x0) r2 = syz_open_dev$amidi(&(0x7f00000002c0)='/dev/amidi#\x00', 0x7fffffff, 0x200000) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r2, 0xc0bc5351, &(0x7f0000001900)={0x0, 0x1, 'client0\x00', 0x1, "0f0789cd36262d9a", "788295fa6d068cf8dee1d10e60c1d0e602bba4e31850531ca0a202df56185cbc", 0xfff, 0x6}) write$P9_RREADDIR(r2, &(0x7f00000001c0)={0xac, 0x29, 0x2, {0x1, [{{0x10, 0x3, 0x8}, 0x10001, 0x0, 0x7, './file0'}, {{0xc4, 0x3, 0x6}, 0x4, 0xfff, 0x7, './file0'}, {{0x48, 0x4, 0x1}, 0x3, 0x6, 0xd, './file0/file0'}, {{0x4, 0x4, 0x4}, 0x81, 0x81, 0x7, './file0'}, {{0x21, 0x4, 0x2}, 0x1, 0x7ff, 0x7, './file0'}]}}, 0xac) ioctl$DRM_IOCTL_INFO_BUFS(r2, 0xc0106418, &(0x7f0000000080)={0x0, 0x7f, 0x0, 0x1020000000000, 0x1, 0x1}) write$P9_RXATTRCREATE(r2, &(0x7f0000000380)={0x1, 0x21, 0x1}, 0x7) 21:59:04 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 707.388146] EXT4-fs (sda1): Unrecognized mount option "debu [ 707.388146] _want_extra_isize=0x0000000000000000" or missing value [ 707.411258] capability: warning: `syz-executor4' uses 32-bit capabilities (legacy support in use) 21:59:04 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:04 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x3f00000000000000, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:04 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) close(r1) [ 707.509895] EXT4-fs (sda1): Unrecognized mount option "debu [ 707.509895] _want_extra_isize=0x0000000000000000" or missing value 21:59:04 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug\nwant_extra_isize'}}]}) 21:59:04 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 707.602647] EXT4-fs (sda1): re-mounted. Opts: 21:59:04 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x6000000, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:04 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x72, 0x8006) ioctl$FS_IOC_RESVSP(r0, 0x4004550d, &(0x7f0000000040)) 21:59:04 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='j/s\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:59:05 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 707.807662] EXT4-fs (sda1): Unrecognized mount option "debug [ 707.807662] want_extra_isize=0x0000000000000000" or missing value 21:59:05 executing program 4: ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0x40286608, &(0x7f0000000440)={0x2000000000000157, &(0x7f0000000400)}) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote, [0x3f000000, 0x700]}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80389}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x9, 0x60}}], 0x48}, 0x0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000680)) [ 707.920158] EXT4-fs (sda1): Unrecognized mount option "debug [ 707.920158] want_extra_isize=0x0000000000000000" or missing value [ 707.945057] rdma_op 00000000bd5960e2 conn xmit_rdma (null) [ 707.975966] rdma_op 0000000022f06146 conn xmit_rdma (null) [ 708.084337] jfs: Unrecognized mount option "pcr=00000000000000000038" or missing value [ 708.265045] EXT4-fs (sda1): re-mounted. Opts: 21:59:05 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jf+\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:59:05 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:05 executing program 1: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)) 21:59:05 executing program 4: ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0x40286608, &(0x7f0000000440)={0x2000000000000157, &(0x7f0000000400)}) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote, [0x3f000000, 0x700]}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80389}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x9, 0x60}}], 0x48}, 0x0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000680)) 21:59:05 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_\nant_extra_isize'}}]}) 21:59:05 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 708.409484] EXT4-fs (sda1): Unrecognized mount option "debug_ [ 708.409484] ant_extra_isize=0x0000000000000000" or missing value [ 708.472382] rdma_op 0000000010d9f5d7 conn xmit_rdma (null) 21:59:05 executing program 4: ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0x40286608, &(0x7f0000000440)={0x2000000000000157, &(0x7f0000000400)}) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote, [0x3f000000, 0x700]}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80389}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x9, 0x60}}], 0x48}, 0x0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000680)) [ 708.521184] EXT4-fs (sda1): Unrecognized mount option "debug_ [ 708.521184] ant_extra_isize=0x0000000000000000" or missing value [ 708.724865] rdma_op 00000000739e54ec conn xmit_rdma (null) 21:59:08 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x7, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:08 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:08 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_w\nnt_extra_isize'}}]}) 21:59:08 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jfl\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:59:08 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x4000000000000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)) 21:59:08 executing program 4: ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0x40286608, &(0x7f0000000440)={0x2000000000000157, &(0x7f0000000400)}) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote, [0x3f000000, 0x700]}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80389}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x9, 0x60}}], 0x48}, 0x0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000680)) 21:59:08 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:08 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x40000000, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 711.292287] rdma_op 0000000031c194ac conn xmit_rdma (null) 21:59:08 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x16b) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)) 21:59:08 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x600, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:08 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x72, 0x8006) ioctl$FS_IOC_RESVSP(r0, 0x80045505, &(0x7f0000000040)) 21:59:08 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:08 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jfx\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) [ 711.436878] usb usb4: usbfs: interface 0 claimed by hub while 'syz-executor4' sets config #0 [ 711.448300] usb usb4: usbfs: interface 0 claimed by hub while 'syz-executor4' sets config #0 21:59:08 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_w%nt_extra_isize'}}]}) 21:59:08 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:08 executing program 4: r0 = socket$inet6(0xa, 0x2000000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r0, 0xfffffffffffffff8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000000100)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000000)=']', 0x1, 0x0, 0x0, 0x0) shutdown(r1, 0x1) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000140)={0x0, @in6={{0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0xf4010000, 0x0, 0x0, 0x0, 0x0, 0x8dffffff00000000]}}}, 0x0, 0x0, 0x0, 0x0, 0x84}, 0x98) 21:59:08 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x200000000000000, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:08 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:08 executing program 1: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) r0 = syz_open_dev$media(&(0x7f0000000200)='/dev/media#\x00', 0x20, 0x80000) ioctl$VIDIOC_S_FBUF(r0, 0x4030560b, &(0x7f0000000280)={0x60, 0x4, &(0x7f0000000240)="c3eb4743fb8e", {0x4, 0x1000000000000007, 0x71767f57, 0xce970828b395a7d5, 0xc15, 0x2, 0x7, 0x1}}) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000180)=0x0) setpriority(0x0, r1, 0x7) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)) fcntl$getownex(r0, 0x10, &(0x7f0000000000)) lsetxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f00000001c0)=@v2={0x2000000, [{0x2, 0xfffffffffffffffd}, {0x10000, 0x2f}]}, 0x14, 0x1) 21:59:08 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x8800000000000000, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:09 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:09 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jfc\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:59:09 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x3000000, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:09 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_wa\nt_extra_isize'}}]}) 21:59:09 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) r0 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x7, 0x40200) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r0, 0x800455d1, &(0x7f00000001c0)) creat(&(0x7f0000000040)='./file0\x00', 0x16) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x100020, &(0x7f0000000300)) 21:59:09 executing program 4: 21:59:09 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:09 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) r0 = syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x8, 0x40400) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc0045520, &(0x7f00000004c0)=0x61c) r1 = syz_open_dev$dspn(&(0x7f0000000340)='/dev/dsp#\x00', 0x80000001, 0x202001) sendmsg$IPVS_CMD_GET_DAEMON(r1, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80002}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="080329bd7000fedbdf250b00000028000100080001000a0000000c0006006c626c6372000000080001000a0000000800050001000000080005000600000008000500ff0f0000"], 0x4c}, 0x1, 0x0, 0x0, 0x4000}, 0x4040000) r2 = getpgrp(0xffffffffffffffff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000380)={{0x7, 0x0, 0x8001, 0x6, 'syz0\x00', 0x4}, 0x6, 0x0, 0x2, r2, 0x6, 0x10001, 'syz0\x00', &(0x7f0000000040)=['\x00', 'bpf\x00', '/dev/dsp#\x00', '\x00', ']vboxnet1\x00', 'bpf\x00'], 0x1e, [], [0x76, 0xe41, 0x8, 0x2]}) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)) 21:59:09 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jfi\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:59:09 executing program 4: [ 712.075471] EXT4-fs: 5 callbacks suppressed [ 712.075485] EXT4-fs (sda1): Unrecognized mount option "debug_wa [ 712.075485] t_extra_isize=0x0000000000000000" or missing value 21:59:09 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:09 executing program 4: [ 712.206817] EXT4-fs (sda1): Unrecognized mount option "debug_wa [ 712.206817] t_extra_isize=0x0000000000000000" or missing value [ 712.329350] EXT4-fs (sda1): re-mounted. Opts: [ 712.396555] EXT4-fs (sda1): re-mounted. Opts: 21:59:10 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x700000000000000, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:10 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:10 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_wa%t_extra_isize'}}]}) 21:59:10 executing program 4: 21:59:10 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jfo\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:59:10 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x6, &(0x7f0000000540)=[{&(0x7f0000000040)="9983f316354014baee23e44495b3b9d37bf8bfcbc71dd63760b191b3025014a83eb54333a8e29bf41fbd6c63fe1d3e946f6e40d7cb", 0x35, 0x100000001}, {&(0x7f00000001c0)="e737a05bf489fa59f0066a8fba6e420d7551bef347b37716c43af6673419c63dce2a8269ba23a63cc2f75bbca92a9f838aef4a240b38c50f595d0af9e4e44534e28695c3b7ed8dd64ce2727b873ad65b67e39040dd947149cdfe63b3ece6b6cfb81b75cdb92a2fabfdc47eaa077fc20005ba", 0x72, 0x4}, {&(0x7f0000000240)="50b45bc4f88f57fbc8bc680959ba1889034f7bdff7878e86f883ffa1c522bbd0960df08f34e89664f4150700000018cced0024303d855c9e09cfffd9169f300ed8d53b1126a09e4759a050f8d3f60f556664c5f680332d6fdbc0ea368d8218f24fe072c567acd000000000000000000000000000000b0000000000000000", 0x13, 0x7f}, {&(0x7f0000000340)="2b5623d9540f3e507eff2879ac526521e993b9cc1aaeee96ef8c84c1b4842d6256f24868c8a730fb795d786ce04b3b5f34fcee8f2b789cae4da5535d9732d25d0439c2b4362cfe65e408c218a6e62c60a150858f3be6a832fe07aacb929b618be5576ae336b877cbfd609940e435cfb1a4a70244cc4cd745d1681f3872aa65e3912402a252b6d3c46694d452f39c5fac4f427ec43092d426db7461ba30ded6566d2955cbfdba9e1651f932dfaf8846f9d12c0beabc1f7aeb3d7d031557f4ec5eda", 0xc1, 0x401}, {&(0x7f0000000440)="5723b9c41ebd6fddf83fb76d023553c7afba988f0ba54b7cb34715c22b082b808ca9d4690c96bafd2708c5254831187900b4692583c141524121047b44159531c718c547a7a6dbdeedf9946588c8d78269d3b71380ca578216ade350ef0351ddaf69054a37e736d2eb073390c50633d90f0a20e3", 0x74, 0xffffffff}, {&(0x7f00000004c0)="38a36c63bfc0965010f274a8038b02d9ff57bf1586a03d59139841ab7919364098396896653ad4a8d6dca34ab196adcf3b06f4c8cd59aa729edb2610bc687289993d2c25c862122defd2db480edb17c62c21708eb83639d14232", 0x5a, 0x1}], 0x1000000, &(0x7f0000000300)) 21:59:11 executing program 4: 21:59:11 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 713.721464] EXT4-fs (sda1): Unrecognized mount option "debug_wa%t_extra_isize=0x0000000000000000" or missing value 21:59:11 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x7fffffe, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:11 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:11 executing program 4: 21:59:11 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jf#\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:59:11 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2000470, &(0x7f0000000240)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)) 21:59:11 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000014000/0x18000)=nil, &(0x7f0000000280)=[@textreal={0x8, &(0x7f0000000240)="640fbe0af0f75100ba420066ed360faa66b9800000c00f326635000800000f308221990fc71e27000f216d260f2134baf80c66b82735ea8166efbafc0cb06cee", 0x40}], 0x1, 0x24, &(0x7f0000000100), 0x1000000000000046) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x1000000000010004, 0x0, 0x0, 0x2000, &(0x7f0000017000/0x2000)=nil}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000040)={[], 0x0, 0x2a4100}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 713.945035] EXT4-fs (sda1): Unrecognized mount option "debug_wa%t_extra_isize=0x0000000000000000" or missing value 21:59:11 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:11 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_wan%_extra_isize'}}]}) [ 714.133083] *** Guest State *** 21:59:11 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:11 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jfu\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) [ 714.159285] CR0: actual=0x0000000000000031, shadow=0x0000000060000011, gh_mask=fffffffffffffff7 [ 714.174053] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 714.187733] CR3 = 0x0000000000000000 [ 714.192037] RSP = 0x0000000000000000 RIP = 0x0000000000000000 [ 714.198226] RFLAGS=0x002a4102 DR7 = 0x0000000000000400 [ 714.205400] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 714.214936] CS: sel=0x0010, attr=0x0009b, limit=0x000fffff, base=0x0000000000000000 [ 714.246487] DS: sel=0x0018, attr=0x00093, limit=0x000fffff, base=0x0000000000000000 21:59:11 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x40000, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0106401, &(0x7f0000000080)={0xc0, &(0x7f00000001c0)=""/192}) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)) [ 714.268286] EXT4-fs (sda1): Unrecognized mount option "debug_wan%_extra_isize=0x0000000000000000" or missing value [ 714.277248] SS: sel=0x0018, attr=0x00093, limit=0x000fffff, base=0x0000000000000000 21:59:11 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 714.313614] ES: sel=0x0018, attr=0x00093, limit=0x000fffff, base=0x0000000000000000 [ 714.326581] EXT4-fs (sda1): re-mounted. Opts: [ 714.339863] FS: sel=0x0018, attr=0x00093, limit=0x000fffff, base=0x0000000000000000 [ 714.348106] GS: sel=0x0018, attr=0x00093, limit=0x000fffff, base=0x0000000000000000 [ 714.356597] GDTR: limit=0x000007ff, base=0x0000000000001000 [ 714.382326] LDTR: sel=0x0008, attr=0x04082, limit=0x000007ff, base=0x0000000000001800 [ 714.407833] EXT4-fs (sda1): Unrecognized mount option "debug_wan%_extra_isize=0x0000000000000000" or missing value [ 714.425087] IDTR: limit=0x0000ffff, base=0x0000000000000000 [ 714.435589] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 714.446638] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 714.453497] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 714.461456] Interruptibility = 00000000 ActivityState = 00000000 [ 714.467746] *** Host State *** [ 714.471347] RIP = 0xffffffff8120427e RSP = 0xffff88017f9d7390 [ 714.477400] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 714.485130] FSBase=00007f75db8f7700 GSBase=ffff8801daf00000 TRBase=fffffe0000003000 [ 714.493898] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 714.509691] CR0=0000000080050033 CR3=000000018261c000 CR4=00000000001426e0 [ 714.516795] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff87e01360 [ 714.536361] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 714.544038] *** Control State *** [ 714.547568] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000ca [ 714.554734] EntryControls=0000d1ff ExitControls=002fefff [ 714.560905] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 714.567893] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 714.575144] VMExit: intr_info=80000306 errcode=00000000 ilen=00000003 [ 714.582343] reason=80000021 qualification=0000000000000000 [ 714.588756] IDTVectoring: info=00000000 errcode=00000000 [ 714.594704] TSC Offset = 0xfffffe7f4d87d2d9 [ 714.599454] EPT pointer = 0x00000001d94b401e 21:59:15 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x300000000000000, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:15 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0xa) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)) recvmmsg(0xffffffffffffff9c, &(0x7f0000004100)=[{{&(0x7f00000001c0)=@ax25, 0x80, &(0x7f0000000000)=[{&(0x7f0000000240)=""/102, 0x66}, {&(0x7f0000000340)=""/253, 0xfd}], 0x2, &(0x7f0000000440)=""/87, 0x57, 0x8}, 0x7fff}, {{&(0x7f00000004c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000540)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x101}, 0xffffffff}, {{&(0x7f00000005c0)=@sco, 0x80, &(0x7f0000001940)=[{&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/59, 0x3b}, {&(0x7f0000001640)}, {&(0x7f0000001680)=""/144, 0x90}, {&(0x7f0000001740)=""/251, 0xfb}, {&(0x7f0000001840)}, {&(0x7f0000001880)=""/143, 0x8f}], 0x7, &(0x7f00000019c0)=""/125, 0x7d, 0x100000001}, 0xc2e1}, {{&(0x7f0000001a40)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000001f40)=[{&(0x7f0000001ac0)=""/86, 0x56}, {&(0x7f0000001b40)=""/150, 0x96}, {&(0x7f0000001c00)=""/160, 0xa0}, {&(0x7f0000001cc0)=""/58, 0x3a}, {&(0x7f0000001d00)=""/174, 0xae}, {&(0x7f0000001dc0)=""/83, 0x53}, {&(0x7f0000001e40)=""/252, 0xfc}], 0x7, &(0x7f0000001fc0)=""/4096, 0x1000, 0x4000000000000000}, 0x1}, {{&(0x7f0000002fc0)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000004040)=[{&(0x7f0000003040)=""/4096, 0x1000}], 0x1, &(0x7f0000004080)=""/125, 0x7d, 0x80000001}, 0x6}], 0x5, 0x40010000, &(0x7f0000004240)={0x77359400}) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000004280)=0x9ca, 0x4) 21:59:15 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jf%\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:59:15 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:15 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_wan\n_extra_isize'}}]}) 21:59:15 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000014000/0x18000)=nil, &(0x7f0000000280)=[@textreal={0x8, &(0x7f0000000240)="640fbe0af0f75100ba420066ed360faa66b9800000c00f326635000800000f308221990fc71e27000f216d260f2134baf80c66b82735ea8166efbafc0cb06cee", 0x40}], 0x1, 0x24, &(0x7f0000000100), 0x1000000000000046) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x1000000000010004, 0x0, 0x0, 0x2000, &(0x7f0000017000/0x2000)=nil}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000040)={[], 0x0, 0x2a4100}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:15 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 718.377895] EXT4-fs (sda1): Unrecognized mount option "debug_wan [ 718.377895] _extra_isize=0x0000000000000000" or missing value 21:59:15 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:15 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x7802000000000000, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:15 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000100)="0fc75af38f49189b26440f00d6c441cb5cc00fc71bc442f932d10f225c0f01cb66baf80cb8a4d35b8bef66bafc0c66edb805000000b9020000000f01c1", 0x3d}], 0x1, 0x40, &(0x7f0000000280), 0x0) r3 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x2028, 0x3fffe) clock_gettime(0x0, &(0x7f0000000280)) write$sndseq(r3, &(0x7f0000000400)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x0, &(0x7f00000003c0)}}], 0x30) clone(0x0, &(0x7f0000000400), &(0x7f0000000180), &(0x7f0000000000), &(0x7f0000000280)) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000040)) getsockopt$inet_sctp6_SCTP_STATUS(r3, 0x84, 0xe, &(0x7f0000000300)={0x0, 0x1, 0x0, 0x2000200000, 0x1f, 0x0, 0x1f, 0x3f, {0x0, @in={{0x2, 0x0, @multicast1}}, 0x2, 0x4f3b, 0x0, 0x2, 0x10000}}, &(0x7f00000003c0)=0xb0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000440)={r4, @in6={{0xa, 0x4e22, 0x800, @loopback}}, 0xfa5}, &(0x7f0000000500)=0x90) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) io_setup(0x0, &(0x7f0000000240)=0x0) socket$pptp(0x18, 0x1, 0x2) io_submit(r5, 0x0, &(0x7f0000000780)) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000640)={0xffffffffffffffff}, 0x13f, 0x1000}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000006c0)={0xf, 0x8, 0xfa00, {r6, 0x5}}, 0x10) ioctl$EVIOCGKEYCODE_V2(r3, 0x80284504, &(0x7f0000000540)=""/253) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) syz_mount_image$vfat(&(0x7f00000001c0)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x6, 0x2, &(0x7f0000000400)=[{&(0x7f0000000280)="d0b7c6bdfef216170c1e0cd4272f94214f6dd1b42c40a31ecddc22a789818db6e5111b4bfb780f8f3dc544a3504a524b4661a5d1991b8113d9d46a4a6a2972f97632b53d328e775df229d0be1954572c2d6fc3e056784dba12", 0x59, 0x80}, {&(0x7f0000000300)="23b7d3f4399b866ec9069856ace3e9d0615f2aadd46f6bb39add27b3fd8abe2850623aa234fe8ea0b0f083537aa8c8b0892526fbe812166313989b74648b596e851643943603a2f4db6f730dfe52c59dff1aca9486e6007f817d9febdca16721afb9a0d8371f0c5efb9bd644132b0f2c3d52a7e6e10c6ad59217dc5e0a595b1fef2a8cb4e6734df67ba730b89eb82ac84920e8a6d7755bd4d47cae7c6bfb75db3469808ed3672c290236e7c5d9f6b2704a59fa4c74ae60b0c0e356874435c09a69992167a0a2bf94f9324417b962a2158a5464d90ba3ff64fa0c4489d8aac8ad76f3cface4d46bd853a30b432fd23c1d84c303", 0xf3, 0xfaf}], 0x80000, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x1000, &(0x7f0000000200)={[{@minixdf='minixdf'}, {@sysvgroups='sysvgroups'}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}, {@noquota='noquota'}]}) r7 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x1ff, 0x2) accept$packet(r3, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000940)=0x14) sendmsg$xdp(r7, &(0x7f0000001080)={&(0x7f0000000980)={0x2c, 0x4, r8, 0x36}, 0x10, &(0x7f0000000fc0)=[{&(0x7f00000009c0)="46d3b5c9a8937eedeeb67a9b12d11c8ee202acc7801e6d05d20189df51bf88f56a055ff0ec3c4e86f78fedd530282ea01a4d68391c58bc2146d93e215293a1db6a0be4072fd40441bd6a989b4f0f7f8899220d25382937808c844abe527cc3016fcc696f5789a01f00c40529dfe7138c8113a89974a0017b286c6fd64f70d45cd5cf2ac7d354237c42976fd3e5a66697cc29b0398ca1cd579760912eefdee2de7d915da6969b1ac3aed875c0a780f4adb3abf134e4397927f6457c56fca94f76926dea61400636327e70dc5a60cd115a325a220bd0902260b7243cab250b2b84ab60ff7064cdd4bc4cefb2d22102312b", 0xf0}, {&(0x7f0000000ac0)="fcfde062ce3e", 0x6}, {&(0x7f0000000b00)="df76da22ccb73e88998bc4fc71835696b3f390abb659a5d8dd8ba58716ddc0f52412572d6b3783146703e23c0ffc0884b82c785accded877003c2b4dc74ff6bfe2f54eced04f9437ba295116308aa6c9d81db37aa8209c137184274556cd23fc33c8adeefd5d0037b7ce882b0c1a106c472d1c34db7ab8253b61e14430348d0ba8c66188bc9b23a15af91096a61eafd63ad833f95fd0952939fc362f0a848a5f6342b4d3be7f14e3f466fd98039e8845a9d0650870778d127239ed635ddc42829fca817a82e6f26833297a1fbcd6e27ce0ff84d22cab", 0xd6}, {&(0x7f0000000c00)="daf1455c1c94e8565e79d36ac8282edef5e36b3883700502af24e4d6adf736901b36235a61cf8550dbe7303779c0672280cb651bc39d56a19205ed75e86c2cd6d100311c3db82d133e323b8fca268a3be80433e07c94fe64cfc9af3381298aead18c3e62c508f850f1675ad977c11842ab68410005311cb93f1dae10358368a7ec27cdc3b9763c04190efa4d5dea44a7ef7215fcd16935ce50568ff1aa25815625d45a2d95f9612ccf22863a3b6aa56289e7d9d31d09be34d7677cd624d43ffa161b576f", 0xc4}, {&(0x7f0000000d00)="6adc", 0x2}, {&(0x7f0000000d40)="43d7c5fe", 0x4}, {&(0x7f0000000d80)="99a320da6fe3ca4df6cca54d0d2be78a1d4e5ddac26cd2d5d5d9e6e59c1358ee276305226ab256038e2a80670835a5a38b2cac32edb55b5aa25773b3e3e85733ddcbef7a8ebcf645fc1b02b4cfab4d7bcbc9b260e4e48ea27634538ed2abdee5fbd022760545889bdc28aea4a19ba8c2aa981a9a00f009975a6049ad320c037fa1f89718fa25996496b2d5f61a5d48bc581c27b9099054741033f28d58bf8dd82e15982afb821c81a2df73bef8a47aa71fcadc11929362e9664ebd1cf46be999511a502a3094c5c453f235c7d04c7788f3bcc68d47257ec2c775be8d843961e356351ab18ea42aee6413b26be28dd7af28cadd", 0xf3}, {&(0x7f0000000e80)="a538cc6a5c8f684b2c4be116ad181f1e565cbea157494a258394c1bc9f54a21cd1c8abf6035d1c9557f3a42dbba407dea1ae508eff21467e578923b56faee9cb3b139fb1ccda6019cc4bc13b02e70b20aebb2b3880adb0191761b8682b53bc4290b4c511fff61bcd445119540f5b314aedfe190347c6c7c00e3cc13e52c14187c00b", 0x82}, {&(0x7f0000000f40)}, {&(0x7f0000000f80)="bb65988d15fb9a85c335433aee0e872452609b35e0ed7774f8042d", 0x1b}], 0xa, 0x0, 0x0, 0x40}, 0x20040001) r9 = dup(0xffffffffffffff9c) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={r7, r9, 0xb, 0x3}, 0x10) 21:59:15 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jf.\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) [ 718.551891] EXT4-fs (sda1): Unrecognized mount option "debug_wan [ 718.551891] _extra_isize=0x0000000000000000" or missing value 21:59:15 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000014000/0x18000)=nil, &(0x7f0000000280)=[@textreal={0x8, &(0x7f0000000240)="640fbe0af0f75100ba420066ed360faa66b9800000c00f326635000800000f308221990fc71e27000f216d260f2134baf80c66b82735ea8166efbafc0cb06cee", 0x40}], 0x1, 0x24, &(0x7f0000000100), 0x1000000000000046) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x1000000000010004, 0x0, 0x0, 0x2000, &(0x7f0000017000/0x2000)=nil}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000040)={[], 0x0, 0x2a4100}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:15 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:16 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want\nextra_isize'}}]}) 21:59:16 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x78020000, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 718.819764] *** Guest State *** [ 718.833552] CR0: actual=0x0000000000000031, shadow=0x0000000060000011, gh_mask=fffffffffffffff7 21:59:16 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jf0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:59:16 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x2000000, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:16 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 718.887024] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 718.912403] EXT4-fs (sda1): Unrecognized mount option "debug_want [ 718.912403] extra_isize=0x0000000000000000" or missing value [ 718.918108] CR3 = 0x0000000000000000 [ 718.941228] RSP = 0x0000000000000000 RIP = 0x0000000000000000 [ 718.958485] RFLAGS=0x002a4102 DR7 = 0x0000000000000400 [ 718.972229] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 718.985066] CS: sel=0x0010, attr=0x0009b, limit=0x000fffff, base=0x0000000000000000 [ 719.011831] DS: sel=0x0018, attr=0x00093, limit=0x000fffff, base=0x0000000000000000 [ 719.042194] SS: sel=0x0018, attr=0x00093, limit=0x000fffff, base=0x0000000000000000 [ 719.058438] ES: sel=0x0018, attr=0x00093, limit=0x000fffff, base=0x0000000000000000 21:59:16 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 719.087792] FS: sel=0x0018, attr=0x00093, limit=0x000fffff, base=0x0000000000000000 [ 719.110834] GS: sel=0x0018, attr=0x00093, limit=0x000fffff, base=0x0000000000000000 [ 719.133838] EXT4-fs (sda1): Unrecognized mount option "debug_want [ 719.133838] extra_isize=0x0000000000000000" or missing value [ 719.153582] GDTR: limit=0x000007ff, base=0x0000000000001000 [ 719.175541] LDTR: sel=0x0008, attr=0x04082, limit=0x000007ff, base=0x0000000000001800 21:59:16 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jf-\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:59:16 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 719.203075] IDTR: limit=0x0000ffff, base=0x0000000000000000 [ 719.225498] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 719.253954] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 719.277319] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 719.309072] Interruptibility = 00000000 ActivityState = 00000000 [ 719.334110] *** Host State *** [ 719.347269] RIP = 0xffffffff8120427e RSP = 0xffff88017faf7390 [ 719.369091] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 719.386447] FSBase=00007f75db8f7700 GSBase=ffff8801dae00000 TRBase=fffffe0000003000 [ 719.395032] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 719.433037] CR0=0000000080050033 CR3=00000001abeac000 CR4=00000000001426f0 [ 719.441961] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff87e01360 [ 719.449224] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 719.455517] *** Control State *** [ 719.466499] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000ca [ 719.474152] EntryControls=0000d1ff ExitControls=002fefff [ 719.480286] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 719.487455] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 719.494812] VMExit: intr_info=80000306 errcode=00000000 ilen=00000003 [ 719.501931] reason=80000021 qualification=0000000000000000 [ 719.508478] IDTVectoring: info=00000000 errcode=00000000 [ 719.516563] TSC Offset = 0xfffffe7ccfb47524 [ 719.521419] EPT pointer = 0x00000001c1e8c01e 21:59:16 executing program 1: socket(0x2000000011, 0x0, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000040)=ANY=[], &(0x7f00000000c0)={0x0, 0x0, [0xca8]}) r0 = socket$inet(0x2, 0x80001, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1}, 0x10) ioctl$sock_ifreq(r0, 0x8910, &(0x7f0000000080)={'ip6gretap0\x00', @ifru_data=&(0x7f0000000040)="5e7a4594df2e7a57915b5b163419f40640fa478698e28564a98972eea57c7656"}) clone(0x6102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) bind$inet(r1, &(0x7f0000000840)={0x2, 0x4e23, @multicast1}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @loopback, [0x0, 0x1f4]}, 0x10) 21:59:16 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_\nxtra_isize'}}]}) 21:59:16 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000014000/0x18000)=nil, &(0x7f0000000280)=[@textreal={0x8, &(0x7f0000000240)="640fbe0af0f75100ba420066ed360faa66b9800000c00f326635000800000f308221990fc71e27000f216d260f2134baf80c66b82735ea8166efbafc0cb06cee", 0x40}], 0x1, 0x24, &(0x7f0000000100), 0x1000000000000046) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x1000000000010004, 0x0, 0x0, 0x2000, &(0x7f0000017000/0x2000)=nil}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000040)={[], 0x0, 0x2a4100}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:59:16 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jfX\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:59:16 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 719.616402] EXT4-fs (sda1): Unrecognized mount option "debug_want_ [ 719.616402] xtra_isize=0x0000000000000000" or missing value 21:59:16 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:17 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x72, 0x8006) ioctl$FS_IOC_RESVSP(r0, 0x4004550c, &(0x7f0000000040)) [ 719.724656] EXT4-fs (sda1): Unrecognized mount option "debug_want_ [ 719.724656] xtra_isize=0x0000000000000000" or missing value [ 719.783081] *** Guest State *** [ 719.786416] CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 [ 719.830150] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 719.885836] CR3 = 0x0000000000000000 [ 719.896670] RSP = 0x0000000000000000 RIP = 0x0000000000000000 [ 719.917955] RFLAGS=0x002a4102 DR7 = 0x0000000000000400 [ 719.934191] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 719.951194] CS: sel=0xf000, attr=0x0009b, limit=0x0000ffff, base=0x00000000ffff0000 [ 719.970595] DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 719.991320] SS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 720.008436] ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 720.026725] FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 720.045012] GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 720.062272] GDTR: limit=0x0000ffff, base=0x0000000000000000 [ 720.080509] LDTR: sel=0x0000, attr=0x00082, limit=0x0000ffff, base=0x0000000000000000 [ 720.097525] IDTR: limit=0x0000ffff, base=0x0000000000000000 [ 720.114604] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 720.132817] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 720.147241] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 720.162704] Interruptibility = 00000000 ActivityState = 00000000 [ 720.175845] *** Host State *** [ 720.183681] RIP = 0xffffffff8120427e RSP = 0xffff8801673a7390 [ 720.196563] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 720.209862] FSBase=00007f75db8d6700 GSBase=ffff8801daf00000 TRBase=fffffe0000033000 [ 720.226723] GDTBase=fffffe0000031000 IDTBase=fffffe0000000000 [ 720.239740] CR0=0000000080050033 CR3=00000001a0e9d000 CR4=00000000001426e0 [ 720.255623] Sysenter RSP=fffffe0000032200 CS:RIP=0010:ffffffff87e01360 [ 720.270276] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 720.283140] *** Control State *** [ 720.290067] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 720.304646] EntryControls=0000d1ff ExitControls=002fefff [ 720.315870] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 720.330822] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 720.345509] VMExit: intr_info=00000000 errcode=00000000 ilen=00000000 [ 720.359004] reason=80000021 qualification=0000000000000000 [ 720.382367] IDTVectoring: info=00000000 errcode=00000000 [ 720.398009] TSC Offset = 0xfffffe7c47fc0700 [ 720.407033] EPT pointer = 0x0000000167df701e [ 720.458997] *** Guest State *** [ 720.464652] CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 [ 720.497495] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 720.517828] CR3 = 0x0000000000000000 [ 720.526167] RSP = 0x0000000000000000 RIP = 0x0000000000000000 [ 720.539073] RFLAGS=0x002a4102 DR7 = 0x0000000000000400 [ 720.551803] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 720.565268] CS: sel=0xf000, attr=0x0009b, limit=0x0000ffff, base=0x00000000ffff0000 [ 720.582301] DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 720.599326] SS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 720.609094] ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 720.620632] FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 720.638995] GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 720.656196] GDTR: limit=0x0000ffff, base=0x0000000000000000 [ 720.671417] LDTR: sel=0x0000, attr=0x00082, limit=0x0000ffff, base=0x0000000000000000 [ 720.688548] IDTR: limit=0x0000ffff, base=0x0000000000000000 [ 720.705813] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 720.722935] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 720.737422] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 720.752887] Interruptibility = 00000000 ActivityState = 00000000 [ 720.759527] *** Host State *** [ 720.762910] RIP = 0xffffffff8120427e RSP = 0xffff88018433f390 [ 720.769369] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 720.776002] FSBase=00007f75db8b5700 GSBase=ffff8801daf00000 TRBase=fffffe0000003000 [ 720.789988] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 720.796353] CR0=0000000080050033 CR3=00000001a0e9d000 CR4=00000000001426e0 [ 720.803827] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff87e01360 [ 720.810975] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 720.821681] *** Control State *** [ 720.828658] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 720.844956] EntryControls=0000d1ff ExitControls=002fefff [ 720.856172] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 720.871149] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 720.885963] VMExit: intr_info=00000000 errcode=00000000 ilen=00000000 [ 720.899909] reason=80000021 qualification=0000000000000000 [ 720.906248] IDTVectoring: info=00000000 errcode=00000000 [ 720.928894] TSC Offset = 0xfffffe7c47fc0700 [ 720.933259] EPT pointer = 0x0000000167df701e 21:59:18 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x20000, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:18 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:18 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jfd\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:59:18 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_%xtra_isize'}}]}) 21:59:18 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x72, 0x8006) ioctl$FS_IOC_RESVSP(r0, 0x4004550c, &(0x7f0000000040)) 21:59:18 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x72, 0x8006) ioctl$FS_IOC_RESVSP(r0, 0x4008550c, &(0x7f0000000040)) 21:59:18 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 721.191728] EXT4-fs (sda1): Unrecognized mount option "debug_want_%xtra_isize=0x0000000000000000" or missing value 21:59:18 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:18 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x3f00, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:18 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:18 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jfp\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) [ 721.337781] EXT4-fs (sda1): Unrecognized mount option "debug_want_%xtra_isize=0x0000000000000000" or missing value 21:59:18 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:18 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_e\ntra_isize'}}]}) 21:59:18 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x8800, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:18 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:18 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x500, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 721.621288] EXT4-fs (sda1): Unrecognized mount option "debug_want_e [ 721.621288] tra_isize=0x0000000000000000" or missing value [ 721.745357] EXT4-fs (sda1): Unrecognized mount option "debug_want_e [ 721.745357] tra_isize=0x0000000000000000" or missing value 21:59:19 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000000)="0a5c2d0240316285717070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x0) close(r1) 21:59:19 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x72, 0x8006) ioctl$FS_IOC_RESVSP(r0, 0x4008550c, &(0x7f0000000040)) 21:59:19 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jf*\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:59:19 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:19 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x7802, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:19 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_ex\nra_isize'}}]}) 21:59:19 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:19 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:19 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x300, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:19 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:19 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:19 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x4, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:19 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jfsz', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:59:20 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x72, 0x8006) ioctl$FS_IOC_RESVSP(r0, 0x4008550c, &(0x7f0000000040)) 21:59:20 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_ex%ra_isize'}}]}) 21:59:20 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:20 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:20 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x600000000000000, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:20 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:59:20 executing program 1: setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:20 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0xffffffff00000000, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:20 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:20 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:59:20 executing program 1: setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:20 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:21 executing program 4: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x600000000000000, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:21 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_ext\na_isize'}}]}) 21:59:21 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0xfeffff0700000000, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:21 executing program 1: setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:21 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:21 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:59:21 executing program 1: r0 = socket(0x0, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:21 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x400000000000000, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 724.002726] EXT4-fs: 4 callbacks suppressed [ 724.002741] EXT4-fs (sda1): Unrecognized mount option "debug_want_ext [ 724.002741] a_isize=0x0000000000000000" or missing value 21:59:21 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:21 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000100)="0fc75af38f49189b26440f00d6c441cb5cc00fc71bc442f932d10f225c0f01cb66baf80cb8a4d35b8bef66bafc0c66edb805000000b9020000000f01c1", 0x3d}], 0x1, 0x40, &(0x7f0000000280), 0x0) r3 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x2028, 0x3fffe) clock_gettime(0x0, &(0x7f0000000280)) write$sndseq(r3, &(0x7f0000000400)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x0, &(0x7f00000003c0)}}], 0x30) clone(0x0, &(0x7f0000000400), &(0x7f0000000180), &(0x7f0000000000), &(0x7f0000000280)) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000040)) getsockopt$inet_sctp6_SCTP_STATUS(r3, 0x84, 0xe, &(0x7f0000000300)={0x0, 0x1, 0x0, 0x2000200000, 0x1f, 0x0, 0x1f, 0x3f, {0x0, @in={{0x2, 0x0, @multicast1}}, 0x2, 0x4f3b, 0x0, 0x2, 0x10000}}, &(0x7f00000003c0)=0xb0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000440)={r4, @in6={{0xa, 0x4e22, 0x800, @loopback}}, 0xfa5}, &(0x7f0000000500)=0x90) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) io_setup(0x0, &(0x7f0000000240)=0x0) socket$pptp(0x18, 0x1, 0x2) io_submit(r5, 0x0, &(0x7f0000000780)) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000640)={0xffffffffffffffff}, 0x13f, 0x1000}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000006c0)={0xf, 0x8, 0xfa00, {r6, 0x5}}, 0x10) ioctl$EVIOCGKEYCODE_V2(r3, 0x80284504, &(0x7f0000000540)=""/253) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) syz_mount_image$vfat(&(0x7f00000001c0)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x6, 0x2, &(0x7f0000000400)=[{&(0x7f0000000280)="d0b7c6bdfef216170c1e0cd4272f94214f6dd1b42c40a31ecddc22a789818db6e5111b4bfb780f8f3dc544a3504a524b4661a5d1991b8113d9d46a4a6a2972f97632b53d328e775df229d0be1954572c2d6fc3e056784dba12", 0x59, 0x80}, {&(0x7f0000000300)="23b7d3f4399b866ec9069856ace3e9d0615f2aadd46f6bb39add27b3fd8abe2850623aa234fe8ea0b0f083537aa8c8b0892526fbe812166313989b74648b596e851643943603a2f4db6f730dfe52c59dff1aca9486e6007f817d9febdca16721afb9a0d8371f0c5efb9bd644132b0f2c3d52a7e6e10c6ad59217dc5e0a595b1fef2a8cb4e6734df67ba730b89eb82ac84920e8a6d7755bd4d47cae7c6bfb75db3469808ed3672c290236e7c5d9f6b2704a59fa4c74ae60b0c0e356874435c09a69992167a0a2bf94f9324417b962a2158a5464d90ba3ff64fa0c4489d8aac8ad76f3cface4d46bd853a30b432fd23c1d84c303", 0xf3, 0xfaf}], 0x80000, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x1000, &(0x7f0000000200)={[{@minixdf='minixdf'}, {@sysvgroups='sysvgroups'}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}, {@noquota='noquota'}]}) r7 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x1ff, 0x2) accept$packet(r3, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000940)=0x14) sendmsg$xdp(r7, &(0x7f0000001080)={&(0x7f0000000980)={0x2c, 0x4, r8, 0x36}, 0x10, &(0x7f0000000fc0)=[{&(0x7f00000009c0)="46d3b5c9a8937eedeeb67a9b12d11c8ee202acc7801e6d05d20189df51bf88f56a055ff0ec3c4e86f78fedd530282ea01a4d68391c58bc2146d93e215293a1db6a0be4072fd40441bd6a989b4f0f7f8899220d25382937808c844abe527cc3016fcc696f5789a01f00c40529dfe7138c8113a89974a0017b286c6fd64f70d45cd5cf2ac7d354237c42976fd3e5a66697cc29b0398ca1cd579760912eefdee2de7d915da6969b1ac3aed875c0a780f4adb3abf134e4397927f6457c56fca94f76926dea61400636327e70dc5a60cd115a325a220bd0902260b7243cab250b2b84ab60ff7064cdd4bc4cefb2d22102312b", 0xf0}, {&(0x7f0000000ac0)="fcfde062ce3e", 0x6}, {&(0x7f0000000b00)="df76da22ccb73e88998bc4fc71835696b3f390abb659a5d8dd8ba58716ddc0f52412572d6b3783146703e23c0ffc0884b82c785accded877003c2b4dc74ff6bfe2f54eced04f9437ba295116308aa6c9d81db37aa8209c137184274556cd23fc33c8adeefd5d0037b7ce882b0c1a106c472d1c34db7ab8253b61e14430348d0ba8c66188bc9b23a15af91096a61eafd63ad833f95fd0952939fc362f0a848a5f6342b4d3be7f14e3f466fd98039e8845a9d0650870778d127239ed635ddc42829fca817a82e6f26833297a1fbcd6e27ce0ff84d22cab", 0xd6}, {&(0x7f0000000c00)="daf1455c1c94e8565e79d36ac8282edef5e36b3883700502af24e4d6adf736901b36235a61cf8550dbe7303779c0672280cb651bc39d56a19205ed75e86c2cd6d100311c3db82d133e323b8fca268a3be80433e07c94fe64cfc9af3381298aead18c3e62c508f850f1675ad977c11842ab68410005311cb93f1dae10358368a7ec27cdc3b9763c04190efa4d5dea44a7ef7215fcd16935ce50568ff1aa25815625d45a2d95f9612ccf22863a3b6aa56289e7d9d31d09be34d7677cd624d43ffa161b576f", 0xc4}, {&(0x7f0000000d00)="6adc", 0x2}, {&(0x7f0000000d40)="43d7c5fe", 0x4}, {&(0x7f0000000d80)="99a320da6fe3ca4df6cca54d0d2be78a1d4e5ddac26cd2d5d5d9e6e59c1358ee276305226ab256038e2a80670835a5a38b2cac32edb55b5aa25773b3e3e85733ddcbef7a8ebcf645fc1b02b4cfab4d7bcbc9b260e4e48ea27634538ed2abdee5fbd022760545889bdc28aea4a19ba8c2aa981a9a00f009975a6049ad320c037fa1f89718fa25996496b2d5f61a5d48bc581c27b9099054741033f28d58bf8dd82e15982afb821c81a2df73bef8a47aa71fcadc11929362e9664ebd1cf46be999511a502a3094c5c453f235c7d04c7788f3bcc68d47257ec2c775be8d843961e356351ab18ea42aee6413b26be28dd7af28cadd", 0xf3}, {&(0x7f0000000e80)="a538cc6a5c8f684b2c4be116ad181f1e565cbea157494a258394c1bc9f54a21cd1c8abf6035d1c9557f3a42dbba407dea1ae508eff21467e578923b56faee9cb3b139fb1ccda6019cc4bc13b02e70b20aebb2b3880adb0191761b8682b53bc4290b4c511fff61bcd445119540f5b314aedfe190347c6c7c00e3cc13e52c14187c00b", 0x82}, {&(0x7f0000000f40)}, {&(0x7f0000000f80)="bb65988d15fb9a85c335433aee0e872452609b35e0ed7774f8042d", 0x1b}], 0xa, 0x0, 0x0, 0x40}, 0x20040001) r9 = dup(0xffffffffffffff9c) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={r7, r9, 0xb, 0x3}, 0x10) 21:59:21 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:59:21 executing program 1: r0 = socket(0x0, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:21 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x11000000, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 724.181133] EXT4-fs (sda1): Unrecognized mount option "debug_want_ext [ 724.181133] a_isize=0x0000000000000000" or missing value 21:59:21 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_ext%a_isize'}}]}) 21:59:21 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:21 executing program 1: r0 = socket(0x0, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:21 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x11, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:21 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:21 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:59:21 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x2000000000000, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:21 executing program 1: r0 = socket(0xa, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 724.490252] EXT4-fs (sda1): Unrecognized mount option "debug_want_ext%a_isize=0x0000000000000000" or missing value [ 724.613766] EXT4-fs (sda1): Unrecognized mount option "debug_want_ext%a_isize=0x0000000000000000" or missing value 21:59:22 executing program 4: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x1000000, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:22 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:22 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5000000, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:22 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:59:22 executing program 1: r0 = socket(0xa, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:22 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extr\n_isize'}}]}) 21:59:22 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:22 executing program 1: r0 = socket(0xa, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:22 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:22 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)="6a6673ff", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) [ 724.932060] EXT4-fs (sda1): Unrecognized mount option "debug_want_extr [ 724.932060] _isize=0x0000000000000000" or missing value [ 725.056151] EXT4-fs (sda1): Unrecognized mount option "debug_want_extr [ 725.056151] _isize=0x0000000000000000" or missing value 21:59:22 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:22 executing program 1: socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:23 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x6) write(r0, &(0x7f0000000680)="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", 0x1000) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000002340), 0x100020, &(0x7f00000023c0)={[{@mblk_io_submit='mblk_io_submit'}, {@data_err_ignore='data_err=ignore'}, {@noauto_da_alloc='noauto_da_alloc'}, {@journal_path={'journal_path', 0x3d, './file0'}}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f00000004c0)=0xe8) mount$bpf(0x0, &(0x7f0000000200)='./file0/file0\x00', &(0x7f0000000240)='bpf\x00', 0x220000, &(0x7f0000000500)={[{@mode={'mode', 0x3d, 0x100}}, {@mode={'mode', 0x3d, 0xc3}}, {@mode={'mode', 0x3d, 0xfffffffffffffffb}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7fffffff}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x7fffffff}}], [{@euid_eq={'euid', 0x3d, r1}}, {@pcr={'pcr', 0x3d, 0x36}}, {@obj_type={'obj_type'}}, {@euid_eq={'euid', 0x3d, r2}}, {@fsname={'fsname', 0x3d, "00f83f0080"}}]}) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f00000001c0)='vmnet0(em0#mime_type\x00', 0x15, 0x2) 21:59:23 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extr%_isize'}}]}) [ 725.994315] EXT4-fs (sda1): Unrecognized mount option "debug_want_extr%_isize=0x0000000000000000" or missing value [ 726.080022] EXT4-fs (sda1): Ignoring removed mblk_io_submit option [ 726.090976] EXT4-fs (sda1): Cannot specify journal on remount [ 726.149006] EXT4-fs (sda1): Unrecognized mount option "debug_want_extr%_isize=0x0000000000000000" or missing value 21:59:25 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0xfeffff07, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:25 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)="6a6673f5", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:59:25 executing program 1: socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:25 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:25 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra\nisize'}}]}) 21:59:25 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x6) write(r0, &(0x7f0000000680)="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", 0x1000) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000002340), 0x100020, &(0x7f00000023c0)={[{@mblk_io_submit='mblk_io_submit'}, {@data_err_ignore='data_err=ignore'}, {@noauto_da_alloc='noauto_da_alloc'}, {@journal_path={'journal_path', 0x3d, './file0'}}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f00000004c0)=0xe8) mount$bpf(0x0, &(0x7f0000000200)='./file0/file0\x00', &(0x7f0000000240)='bpf\x00', 0x220000, &(0x7f0000000500)={[{@mode={'mode', 0x3d, 0x100}}, {@mode={'mode', 0x3d, 0xc3}}, {@mode={'mode', 0x3d, 0xfffffffffffffffb}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7fffffff}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x7fffffff}}], [{@euid_eq={'euid', 0x3d, r1}}, {@pcr={'pcr', 0x3d, 0x36}}, {@obj_type={'obj_type'}}, {@euid_eq={'euid', 0x3d, r2}}, {@fsname={'fsname', 0x3d, "00f83f0080"}}]}) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f00000001c0)='vmnet0(em0#mime_type\x00', 0x15, 0x2) 21:59:25 executing program 1: socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:25 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:25 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x4000, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:25 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:25 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x90, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}]}, 0x108) 21:59:25 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:59:25 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x6) write(r0, &(0x7f0000000680)="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", 0x1000) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000002340), 0x100020, &(0x7f00000023c0)={[{@mblk_io_submit='mblk_io_submit'}, {@data_err_ignore='data_err=ignore'}, {@noauto_da_alloc='noauto_da_alloc'}, {@journal_path={'journal_path', 0x3d, './file0'}}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f00000004c0)=0xe8) mount$bpf(0x0, &(0x7f0000000200)='./file0/file0\x00', &(0x7f0000000240)='bpf\x00', 0x220000, &(0x7f0000000500)={[{@mode={'mode', 0x3d, 0x100}}, {@mode={'mode', 0x3d, 0xc3}}, {@mode={'mode', 0x3d, 0xfffffffffffffffb}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7fffffff}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x7fffffff}}], [{@euid_eq={'euid', 0x3d, r1}}, {@pcr={'pcr', 0x3d, 0x36}}, {@obj_type={'obj_type'}}, {@euid_eq={'euid', 0x3d, r2}}, {@fsname={'fsname', 0x3d, "00f83f0080"}}]}) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f00000001c0)='vmnet0(em0#mime_type\x00', 0x15, 0x2) 21:59:25 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x88, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:25 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 728.201015] kernel msg: ebtables bug: please report to author: Total nentries is wrong 21:59:25 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_\nsize'}}]}) 21:59:25 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x90, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}]}, 0x108) 21:59:25 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x6, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:25 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:25 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) [ 728.415981] kernel msg: ebtables bug: please report to author: Total nentries is wrong 21:59:25 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x500000000000000, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:25 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x6) write(r0, &(0x7f0000000680)="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", 0x1000) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000002340), 0x100020, &(0x7f00000023c0)={[{@mblk_io_submit='mblk_io_submit'}, {@data_err_ignore='data_err=ignore'}, {@noauto_da_alloc='noauto_da_alloc'}, {@journal_path={'journal_path', 0x3d, './file0'}}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f00000004c0)=0xe8) mount$bpf(0x0, &(0x7f0000000200)='./file0/file0\x00', &(0x7f0000000240)='bpf\x00', 0x220000, &(0x7f0000000500)={[{@mode={'mode', 0x3d, 0x100}}, {@mode={'mode', 0x3d, 0xc3}}, {@mode={'mode', 0x3d, 0xfffffffffffffffb}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x24}}, {@mode={'mode', 0x3d, 0x7fffffff}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x7fffffff}}], [{@euid_eq={'euid', 0x3d, r1}}, {@pcr={'pcr', 0x3d, 0x36}}, {@obj_type={'obj_type'}}, {@euid_eq={'euid', 0x3d, r2}}, {@fsname={'fsname', 0x3d, "00f83f0080"}}]}) 21:59:25 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:25 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x90, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}]}, 0x108) 21:59:25 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:25 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x88000000, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 728.571159] kernel msg: ebtables bug: please report to author: Total nentries is wrong 21:59:25 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:59:25 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_i\nize'}}]}) 21:59:25 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:26 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:26 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x6) write(r0, &(0x7f0000000680)="e3edf1c080d55c9cedf6ccaf105c1634a0df040706ca55e581826be47ade471c0dca8a8643e66046371bd53b01808f1556b3a52fec11af6afe4d2a9a5b51a7d948a54b5745c688b72162aa8afed4a50793ea58492da056d7c6424528c19f7926a2f1be9a4d2e72dc23243e27cc98803f8b00f6b7f0bef2e54cb895d0a96e60628450248583df22cd15a25345f33f69e03a11e22f9aa5172dfb84d9fa1a29b1cbacfa80a6745ff597d416a2b79049af93ec160ab42c244e7cc0aeda41642ada66cac782d0a6671da62dea941dc31aac5b12409f9a8e125b3255cc24130d556794110f75e3f1d9e529560744932e32c8432ff95800d279fbb524feb4e836dd51b306beeea852d4af0282e2e37f070b3d26c259c386b26b771e04f04d63fb45aaa55f2c7af071c9a36dbe6a813f10379d6e3e03d3557e751e0ea11c3a8a39bc4b80a18746d7f741d07014246da1364d75c35a49a1679f69007be1ca627f68b49dc7e801f5f0c6eb2832814dbe6f7a2cce03b771407f8da7c5b8234416f58f22487eaa526576507cba5f7bef56e14ee0eeb3bc1c216a7021a86da08679dc3b11dc1b22f6996d2c38f6482938986adb2189b16c82ba9628fa421f22aeda40f515762f2f4112619eaa28ed95013ee16425365881fef43b0294f9a089a821e678969d28fcb2b24499ade81a17f405e3d236b890dd6009527c1330d5f302fa05a93ec07a001eff7c48ed5abbd12c4ef03ddc40a6a285ff55ee93cb5fdc97e95f46f93e639089184ef9b543e7860adf27e444b9561124292ad76be84a16aa907e913e5d8019126d8c65e13f6f8f0dff0541e8428e6ffb6edd38f6f68375b5c837aa319558b04c09213dfb06ed72ad7973dc7fe83ea7ed09fcba1cd1aab4ec31384dc249dbce42f78466ededfcd3f87f17751f379f314f82518700e6b8ada589b232f6b9375908736730f9d8c9cf4a1077b1e0196f067a3fc70e8210bc8a6e605a0a54482ca32a1c07c59bd6664360d5a6d97555013026f90320908f75a62ad2e850c488bba9a684771b25620f42dced1426e176d83adfe24deab1dae49ef0ee200c8301658b5e077eb271aa04eb95ba8b4f58d1ac900ad22ca1966a1a6aac6db31a17420a6d2555a6bc0b39f84971b5ad79f25551a42f24a66154e798b3aa1eec7d4bd9cb6687071b03bd953e515b3dbfb15a828d7a72133f056197646e44f536e2939b494c5da4c0b2e8f978655834d043e75858b274d2bb8cb41a0addbf1175b88724486b21dd7ac55e8a8f15362b426feb3088dfa19876f984fb8f180e83b9d4c1a0d926782779925770fbdc1a46c0ffa8b91480fa6f13d03074b99332c9792b4fa80171fb6a06b337b4910948deda86d858009de3aaa9ae8a53f9aa595665c821f4ff54969c497fdaf00a65fc0b21c83f7744d7ca10f598c3920295bcb9282602fc98ced34d0f86e1f9041c375bca4296356ee845f52f78f590cdb2c6d6afa1c58801eea26b70d6ca84ff1ca98ed1d85170c4096261573ab6abc3a16b582d43171b51045774be53496ffe8cb98df02235dcb72c70da832e339288404c61e7fd71d482ab79ef5b2d5f1c6890bd34331223393ece4cb392547e47d6104fb87aca814ae8e1cac3cc70cf9ba115bde6f5b971dd366d944bb4e5ada8a139a5b5bd80cd6b4a9a4c2dfd5739f48b9c1813c4a1174f0fd59556607089dbe5b0a552f1f294016a608a1cad0ed71ee7670da5a6f8148d50ee7af8252284e1697d3b812c9dd0b42642946711979c8726f22a71cb8500c1254fd7e7244966939eafeeae3e178276d14c4b3240ee718c624da6346b09407203130e9a5c91979d84727d91651e8ac2d899044dbaca4e5bd42d886caf25f6c7b928e7a58b01663f2a29ee91de95610c196a8dd97c7d9cc6ee9f8f807e0fbaef5531e7a45f6f2e2e0eef7bd99a74249b671533ee8cf5d8387e1dfbd8b140cf1e648d7ea690f1977a8714fd704e4a542da76323f2709e8e779147c5fd316d1fd3ee180671242058684f4b33a96341923d44bd74af4f727bebfafc77646617025ae6bcad8b335fef9d62d0924ef6573d609b6d7a5608486901413ee57595d84aecb3df3245a86129e1fca678825d2d1c5df871cbf5bd83ac13f6a0a97df117cd5893c7da0a6095922ca03475e4468c25dae89e76507a7cb96170b8f6afaee6d096f6ccbc5e0371632a2094161f5fbab241e3fe7d144d934628a7cd5158183d768b60bb43aefc451e48052d83ed35d019f61b4fc5302566f171a4273510591d0da6e4e47a82723f109f5caa59b8a6810b53be287ef62b4069324b454a451b31a99283ac0a63678185a6eb44f3aa7976c9d10c07f9ef7c5a76969730a3cf49a0bb183609c47b2c264a5118fca0f341498870d7458dc4c56e9057f508d924cc991d4969b497f7de8304032c475e5e62d7ec85065fac08b8927c582e1f04c56119917b2ee7200daa87903f1290f66040172332ce7ea2feb678fdcaf6b98d6d3ccf0b52ca8dbd80db6b2c4d4d9c5567febe8317f2dff5d8629a891ec9b9483a865ddc34af7df4d7c103579f12160ae7a142e83bf681e8696dda8f4b912e3abd18744702305ef6a237d175b0a6e34f7df5e8f29dcdf423554598cd443a309f4f7235923f46f337e97a8bfa8f2193d57327dc93dff22f16bb71e3cc72ec02dfc4c2e6f40e66cdc3da87c2deeea5c8d7b064a6f3822b88f9c42db6dc5ad474b0a2cf703e82f9f3ad85f0e399a0c085c18165aaacd582c4e341f8c9ed38f1a87d1f02fc39dea1beeaec33f39c9e4671e17498f035845e9ca324ecb7bc822127200f9f31f5511384053cfa500d036d2c8f5310b54738df52da90ab38fe2287d78e27ce5fea124ad5efc61f0fe14c162a62f1aecf0d4f0f3f3c0df25656274ac500bb7f001969d4a06b28385237ebee5b083f91c3bd78a229d4fd202b0598ddf78c9fc0eb2f9b1a29c691cb97bb8cf109b198ea34d24074fb53b426e4e56c5150614095c2418564a8ff84ead8c46d79b015e5dc980f7addbd44b16534ed6b481842835af8728aabaf8e192cd50eed0703223e7f7428d70de4e2106eceea86bbf621f0eedb31533e6f36f60a4cfee2875862e673e9665ad2be24d2ece2543dc7f5961b9e735090bafd475580086949e34a6023a00e50f70720b4152d9d26e7e491b7fca54283b83169ff0aa6725da7c615d29985680202580c73829670e6a43310fbd8f3ccce7e41a4cd07b7f58a171f27cbcf7157d0c257d799b435af66d754f04e2f8acc197604a7361b90f65a836fa82462936b861fc980a924bbb4aa660bf3216958223fec60c2367e84b06b1729d358ccb6e31efe19bc287d09c862b2457f77ed68f5869ccd327c2e1f53323308a6b75ffe19da34655981611e73f78d27c2ea9b42b8cdbff7d29405b5bdd3ff8153ffe3c64233690b9318fcf3bc209f1c41c03bb3c6775836048719e2e37f916a0a7416d9e078ff4861c47c8ed790391326a7d51b0528ac4d09a89f5ee67276d19d68bdf7325243c0d0b8b9394d7b554cc20f220a951db7c5cafb3cd70c8bcbafbb411ba399c4ae412b2d2dc082cc311b77b8a209c3eafcf6059264663011a72af59161839fa1504224e5c6d0a42e7bbf9c46cdccaa35728042c4cda8d14eac483664e61fbf517812a7cc23d24c797bab8fb7c39489bc99a4cfbda374c8b717929a46321ea05b1f3e3a53e2b782d3f2efb7fb262ba1f569d30983478ceb1578dca77026bd754496dc0a3f6f85767a7cf8096236601882afd4d081b9b3565fe5e92f017c5e00306fe8cbcfb430ba55b1f70df2c0cff6dd4d92d224e393af4812a9cddaaa6f8507eb5489b8adfec850d0e1cb4b0ad91a65dda747e5ae5553450ae9280c846d2b80066991bb0dd44b51ba8e1321c3b669bcfdf34eeae58f473a82586f018e97336c2a9ba7db690bc29347c2d0ab2ff7d4ed021e77213879bf6554897d5d2c8b701dbdba1ad87e46bb6ed89cc01030d4d4305b4e8a7a66ce39ee12c620c0e7db1ca23c923558f26aceb8323dff330a29a37882e112b272962ff340907d283d2b968b15a6185254145b6deb288e7339feec1e9cc30b410bd7419af21aba876c7dfc634d416cbeb8f7f3c26a692bd7fbf2d6eb483e1225cf66dff9e9251d6bf6a1e6374b2f7df43d6d5ebc6ad80b985a9f9eec91321f4a54649cd17f854fd9a9a3edf5f70aba502eacf5618e9221bb429ff522d51dd0b8d80030fb5877982b4a23b34fcb3629a904224ce16ccdd4c34f3c3aeb77d9fd9670caa84bd30d8ef7e805ead3c8900b4adea2b0e756c418aab5550e8ba32f22c1be4d8a53fd5236e785106fd33664e2f4b00f0af8787b31527931b41d6ac762ba3664b8313f75057e07622618f02c0743b4b3498f3ad5d543cb7cf8d367078d722ffff69a68ee7f1bd6a4ed51b9ae0f4072f563600fb7491f32011693811b387cb884250298e0b9eff6d9a03d61c1a9d112b006bc598e61885317b26ee38f053a668a469f0ba0cd11f6bb444efef00a36f71bdf5ba478dde0ff7f5e80dc1bec21690525754f051f3db6fafabd2bcb850101d7378ec1368075054a9956c8008e02dd19c16e3e35024778b7e48cfedf5d403d4e7badf461d9cf8b62a663249bb8e35d5a8232ca9bce50224f6da9d343a8b2c72b205942e0004ec6dee338659bb5efde8debc291249fc3193a5cfadf2ce7d0bf869d5a35c99d41c09f764d7b7e499149035415e2a187b5c0a5b1ba87fc82708e81b673bf5296c835711f240b3f16ecd3fceecce7a9d763dafee9236e0ee3f77df2923d5c3999af12aa92f07031d047ba325bb8ea8d1575aaa31fd44d9cf3b6c373f2fd9f58f0e9c4cb09fb8ceb3c10a04c9e1883794f49646fb9ef0119e8f8a4354378dd0ad4d83b9933c72f10a27dcd270f1feb22a11a0c960a7426f46d4036c573109ddd78583ca3189681370c91d943712aa97bbeedf301ade69735be47fad0dc2cd7690dfd3a4ea32dca11052ca61c4865d311cdcf71729af292a290f550bb17ed0bd63329efc03cffdcf38efd1763fc9fde91baaaf2b4d3db4220ebe39cd3ef7955b2dfe1630f5d3118b0e5c0d1f082f6d2cef4e76474ef4184a4274eb496e4c0e2b664d6f2fa9029938592f33b36cc89814d497ece1f44e7b5178af58f83e3459100538cb8e9898d5291d0a1440846908f93211fbf827ec85453268056c42ad3331be08ea65fc0899bb056291b7ca53273a4d7f84cebe3fa28932ff0c4eadbd8ee58bd1ac65d4320f78e8b17f89acfac665d26aa7d28ebed753e51157230881fd73441d41b23298c8f5e7125c55bc70bf157cc6f31dce179582a091f42df00cab90a041104a67091769d6f25d1406fe7cda57b03b87e9da11ed548fc488577edddb0f2cd4ed0f2760d7fc3fafb763166f22a13ea23e97d68ca61f48fd44ff2bed65f07c0f48b0a9cdbd123c8fd5e412eaf57fa5899489b5b1175f0220e4d9e7658ab9d7f490ad713dc3c8785a837c8af5cb107872660a4646d3c375a1e5c8f0f6a819c105db157aa836a0768837a46746930c46cc615e469b93a628f28e2627b592dd4e2be36cff9469ee47084abda0d75bbd0a034581a47861d21e5abd2ef65850a6d0c696b0fef393f8002ecb2b7c382c5bc9718b081b22fda86090a8ad82ce6000c38550f195b1f45860b47cde872adeca9ec773af7772882153499b8596763e141913b3bd86d65953aa96be0f8834408536881be9671ab5e96145b15b94df2a17db69dec45cdb2c052152458a5630f7fcafe635944186b7a", 0x1000) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000002340), 0x100020, &(0x7f00000023c0)={[{@mblk_io_submit='mblk_io_submit'}, {@data_err_ignore='data_err=ignore'}, {@noauto_da_alloc='noauto_da_alloc'}, {@journal_path={'journal_path', 0x3d, './file0'}}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast2, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@loopback, @in6=@dev}}, {{@in6}}}, &(0x7f00000004c0)=0xe8) 21:59:26 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x3f000000, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:26 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 728.757948] kernel msg: ebtables bug: please report to author: bad policy 21:59:26 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:26 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x4000000, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:26 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)="6a6673ff", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) [ 728.903393] kernel msg: ebtables bug: please report to author: bad policy 21:59:26 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_i%ize'}}]}) 21:59:26 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:26 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:26 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x6) write(r0, &(0x7f0000000680)="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", 0x1000) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000002340), 0x100020, &(0x7f00000023c0)={[{@mblk_io_submit='mblk_io_submit'}, {@data_err_ignore='data_err=ignore'}, {@noauto_da_alloc='noauto_da_alloc'}, {@journal_path={'journal_path', 0x3d, './file0'}}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast2, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) 21:59:26 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 729.082388] kernel msg: ebtables bug: please report to author: bad policy 21:59:26 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:59:26 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x160, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}]}]}, 0x1d8) [ 729.172241] EXT4-fs: 13 callbacks suppressed [ 729.172253] EXT4-fs (sda1): Ignoring removed mblk_io_submit option 21:59:26 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 729.214939] EXT4-fs (sda1): Cannot specify journal on remount [ 729.290069] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i%ize=0x0000000000000000" or missing value [ 729.295105] kernel msg: ebtables bug: please report to author: Total nentries is wrong 21:59:26 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:26 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)="6a66737f", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) [ 729.419751] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i%ize=0x0000000000000000" or missing value 21:59:28 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x700, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:28 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x6) write(r0, &(0x7f0000000680)="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", 0x1000) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000002340), 0x100020, &(0x7f00000023c0)={[{@mblk_io_submit='mblk_io_submit'}, {@data_err_ignore='data_err=ignore'}, {@noauto_da_alloc='noauto_da_alloc'}, {@journal_path={'journal_path', 0x3d, './file0'}}]}) 21:59:28 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x160, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}]}]}, 0x1d8) 21:59:28 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:28 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_i.ize'}}]}) 21:59:28 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:59:28 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 731.360330] EXT4-fs (sda1): Ignoring removed mblk_io_submit option [ 731.363120] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 731.392383] EXT4-fs (sda1): Cannot specify journal on remount 21:59:28 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x160, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}]}]}, 0x1d8) 21:59:28 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 731.449391] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i.ize=0x0000000000000000" or missing value 21:59:28 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x3, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:28 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)="6a667302", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:59:28 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x6) write(r0, &(0x7f0000000680)="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", 0x1000) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000002340), 0x100020, &(0x7f00000023c0)={[{@mblk_io_submit='mblk_io_submit'}, {@data_err_ignore='data_err=ignore'}, {@noauto_da_alloc='noauto_da_alloc'}, {@journal_path={'journal_path', 0x3d, './file0'}}]}) [ 731.512340] kernel msg: ebtables bug: please report to author: Total nentries is wrong 21:59:28 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:28 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0x0, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 731.561977] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i.ize=0x0000000000000000" or missing value 21:59:28 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:28 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_ipize'}}]}) 21:59:28 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x6) write(r0, &(0x7f0000000680)="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", 0x1000) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000002340), 0x100020, &(0x7f00000023c0)={[{@mblk_io_submit='mblk_io_submit'}, {@data_err_ignore='data_err=ignore'}, {@noauto_da_alloc='noauto_da_alloc'}, {@journal_path={'journal_path', 0x3d, './file0'}}]}) 21:59:29 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:29 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0x0, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 731.701533] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 21:59:29 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:59:29 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 731.815262] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 21:59:29 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:29 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x6) write(r0, &(0x7f0000000680)="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", 0x1000) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000002340), 0x100020, &(0x7f00000023c0)={[{@mblk_io_submit='mblk_io_submit'}, {@data_err_ignore='data_err=ignore'}, {@noauto_da_alloc='noauto_da_alloc'}, {@journal_path={'journal_path', 0x3d, './file0'}}]}) 21:59:29 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0x0, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 731.882171] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ipize=0x0000000000000000" or missing value 21:59:29 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:29 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x208, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x280) 21:59:29 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 732.000544] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 732.020467] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ipize=0x0000000000000000" or missing value 21:59:29 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_i0ize'}}]}) 21:59:29 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:59:29 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:29 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x6) write(r0, &(0x7f0000000680)="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", 0x1000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000002340), 0x100020, &(0x7f00000023c0)={[{@mblk_io_submit='mblk_io_submit'}, {@data_err_ignore='data_err=ignore'}, {@noauto_da_alloc='noauto_da_alloc'}, {@journal_path={'journal_path', 0x3d, './file0'}}]}) 21:59:29 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x208, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x280) 21:59:29 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:29 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:29 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x6) write(r0, &(0x7f0000000680)="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", 0x1000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000002340), 0x100020, &(0x7f00000023c0)={[{@mblk_io_submit='mblk_io_submit'}, {@data_err_ignore='data_err=ignore'}, {@noauto_da_alloc='noauto_da_alloc'}, {@journal_path={'journal_path', 0x3d, './file0'}}]}) 21:59:29 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x208, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x280) 21:59:29 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:59:29 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:29 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:29 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_i*ize'}}]}) 21:59:29 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x0, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:29 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:29 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:29 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x6) write(r0, &(0x7f0000000680)="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", 0x1000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000002340), 0x100020, &(0x7f00000023c0)={[{@mblk_io_submit='mblk_io_submit'}, {@data_err_ignore='data_err=ignore'}, {@noauto_da_alloc='noauto_da_alloc'}, {@journal_path={'journal_path', 0x3d, './file0'}}]}) 21:59:29 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:29 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x0, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:29 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)="6a6673eb", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:59:29 executing program 4: socket$netlink(0x10, 0x3, 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000002340), 0x100020, &(0x7f00000023c0)={[{@mblk_io_submit='mblk_io_submit'}, {@data_err_ignore='data_err=ignore'}, {@noauto_da_alloc='noauto_da_alloc'}, {@journal_path={'journal_path', 0x3d, './file0'}}]}) 21:59:29 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:30 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:30 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x0, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:30 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_icize'}}]}) 21:59:30 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:30 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:30 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000002340), 0x100020, &(0x7f00000023c0)={[{@mblk_io_submit='mblk_io_submit'}, {@data_err_ignore='data_err=ignore'}, {@noauto_da_alloc='noauto_da_alloc'}, {@journal_path={'journal_path', 0x3d, './file0'}}]}) 21:59:30 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:30 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:59:30 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:30 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:30 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:30 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:59:30 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:30 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:30 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_iuize'}}]}) 21:59:30 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:30 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000002340), 0x100020, &(0x7f00000023c0)={[{@mblk_io_submit='mblk_io_submit'}, {@data_err_ignore='data_err=ignore'}, {@noauto_da_alloc='noauto_da_alloc'}, {@journal_path={'journal_path', 0x3d, './file0'}}]}) 21:59:30 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:30 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:30 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:30 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)="6a6673ff", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:59:30 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x1d8, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x250) 21:59:30 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000002340), 0x100020, &(0x7f00000023c0)={[{@mblk_io_submit='mblk_io_submit'}, {@data_err_ignore='data_err=ignore'}, {@noauto_da_alloc='noauto_da_alloc'}, {@journal_path={'journal_path', 0x3d, './file0'}}]}) 21:59:30 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:30 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x1d8, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x250) [ 733.506966] kernel msg: ebtables bug: please report to author: Total nentries is wrong 21:59:30 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 733.614696] kernel msg: ebtables bug: please report to author: Total nentries is wrong 21:59:30 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_ilize'}}]}) 21:59:30 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x1d8, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x250) 21:59:30 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000002340), 0x100020, &(0x7f00000023c0)={[{@mblk_io_submit='mblk_io_submit'}, {@data_err_ignore='data_err=ignore'}, {@noauto_da_alloc='noauto_da_alloc'}, {@journal_path={'journal_path', 0x3d, './file0'}}]}) 21:59:31 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:59:31 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:31 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 733.786515] kernel msg: ebtables bug: please report to author: Total nentries is wrong 21:59:31 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x0, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:31 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:31 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000002340), 0x0, &(0x7f00000023c0)={[{@mblk_io_submit='mblk_io_submit'}, {@data_err_ignore='data_err=ignore'}, {@noauto_da_alloc='noauto_da_alloc'}, {@journal_path={'journal_path', 0x3d, './file0'}}]}) 21:59:31 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 733.925153] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 21:59:31 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_ixize'}}]}) 21:59:31 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:59:31 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x0, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:31 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:31 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 734.127893] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 21:59:31 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000002340), 0x0, &(0x7f00000023c0)={[{@mblk_io_submit='mblk_io_submit'}, {@data_err_ignore='data_err=ignore'}, {@noauto_da_alloc='noauto_da_alloc'}, {@journal_path={'journal_path', 0x3d, './file0'}}]}) 21:59:31 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)="6a6673fb", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) [ 734.214368] EXT4-fs: 14 callbacks suppressed [ 734.214381] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ixize=0x0000000000000000" or missing value 21:59:31 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x0, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:31 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:31 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 734.328333] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ixize=0x0000000000000000" or missing value [ 734.362107] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 21:59:31 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:31 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:31 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_idize'}}]}) 21:59:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000002340), 0x0, &(0x7f00000023c0)={[{@mblk_io_submit='mblk_io_submit'}, {@data_err_ignore='data_err=ignore'}, {@noauto_da_alloc='noauto_da_alloc'}, {@journal_path={'journal_path', 0x3d, './file0'}}]}) 21:59:31 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:31 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)="6a667303", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:59:31 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:31 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:31 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:31 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 734.677477] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_idize=0x0000000000000000" or missing value 21:59:32 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:32 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000002340), 0x100020, &(0x7f00000023c0)={[{@mblk_io_submit='mblk_io_submit'}, {@data_err_ignore='data_err=ignore'}, {@noauto_da_alloc='noauto_da_alloc'}]}) 21:59:32 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:32 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 734.783623] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_idize=0x0000000000000000" or missing value 21:59:32 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_ioize'}}]}) 21:59:32 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x248, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2c0) 21:59:32 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:59:32 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:32 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 734.926933] EXT4-fs (sda1): Ignoring removed mblk_io_submit option [ 734.948179] EXT4-fs (sda1): re-mounted. Opts: mblk_io_submit,data_err=ignore,noauto_da_alloc, 21:59:32 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 735.021673] x_tables: eb_tables: redirect target: used from hooks POSTROUTING, but only usable from PREROUTING/BROUTING 21:59:32 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000002340), 0x100020, &(0x7f00000023c0)={[{@mblk_io_submit='mblk_io_submit'}, {@data_err_ignore='data_err=ignore'}]}) 21:59:32 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:32 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x248, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2c0) [ 735.164738] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ioize=0x0000000000000000" or missing value 21:59:32 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:59:32 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 735.217825] EXT4-fs (sda1): Ignoring removed mblk_io_submit option [ 735.225573] x_tables: eb_tables: redirect target: used from hooks POSTROUTING, but only usable from PREROUTING/BROUTING [ 735.240027] EXT4-fs (sda1): re-mounted. Opts: mblk_io_submit,data_err=ignore, 21:59:32 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 735.271127] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ioize=0x0000000000000000" or missing value 21:59:32 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_i#ize'}}]}) 21:59:32 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:32 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000002340), 0x100020, &(0x7f00000023c0)={[{@mblk_io_submit='mblk_io_submit'}]}) 21:59:32 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x248, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2c0) 21:59:32 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:32 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:32 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) [ 735.452105] x_tables: eb_tables: redirect target: used from hooks POSTROUTING, but only usable from PREROUTING/BROUTING 21:59:32 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:32 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000002340), 0x100020, &(0x7f00000023c0)={[{@mblk_io_submit='mblk_io_submit'}]}) 21:59:32 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:32 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:32 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_i+ize'}}]}) [ 735.650441] kernel msg: ebtables bug: please report to author: bad policy 21:59:33 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)="6a6673ff", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:59:33 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:33 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:33 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000002340), 0x100020, &(0x7f00000023c0)={[{@mblk_io_submit='mblk_io_submit'}]}) 21:59:33 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 735.825416] kernel msg: ebtables bug: please report to author: bad policy 21:59:33 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:33 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:33 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:33 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_i-ize'}}]}) [ 735.993780] kernel msg: ebtables bug: please report to author: bad policy 21:59:33 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000002340), 0x100020, &(0x7f00000023c0)={[{@data_err_ignore='data_err=ignore'}]}) 21:59:33 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:59:33 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x248, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2c0) 21:59:33 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:33 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:33 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:33 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 736.156194] x_tables: eb_tables: redirect target: used from hooks POSTROUTING, but only usable from PREROUTING/BROUTING 21:59:33 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x248, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2c0) 21:59:33 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:33 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:59:33 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000002340), 0x100020, &(0x7f00000023c0)={[{@mblk_io_submit='mblk_io_submit'}, {@data_err_ignore='data_err=ignore'}, {@noauto_da_alloc='noauto_da_alloc'}]}) [ 736.323898] x_tables: eb_tables: redirect target: used from hooks POSTROUTING, but only usable from PREROUTING/BROUTING 21:59:33 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_iiize'}}]}) 21:59:33 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:33 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x248, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2c0) 21:59:33 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:33 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:33 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000002340), 0x100020, &(0x7f00000023c0)={[{@mblk_io_submit='mblk_io_submit'}, {@data_err_ignore='data_err=ignore'}, {@noauto_da_alloc='noauto_da_alloc'}]}) [ 736.506007] x_tables: eb_tables: redirect target: used from hooks POSTROUTING, but only usable from PREROUTING/BROUTING 21:59:33 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:59:33 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:33 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:33 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 736.684642] kernel msg: ebtables bug: please report to author: bad policy 21:59:34 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:34 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000002340), 0x100020, &(0x7f00000023c0)={[{@mblk_io_submit='mblk_io_submit'}, {@data_err_ignore='data_err=ignore'}, {@noauto_da_alloc='noauto_da_alloc'}]}) 21:59:34 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_iXize'}}]}) 21:59:34 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:34 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:34 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)="6a6673fc", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:59:34 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:34 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:34 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 736.908306] kernel msg: ebtables bug: please report to author: bad policy 21:59:34 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000002340), 0x100020, &(0x7f00000023c0)={[{@mblk_io_submit='mblk_io_submit'}, {@data_err_ignore='data_err=ignore'}, {@noauto_da_alloc='noauto_da_alloc'}]}) 21:59:34 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:34 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 737.023275] kernel msg: ebtables bug: please report to author: bad policy 21:59:34 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:59:34 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x248, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2c0) 21:59:34 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_is\nze'}}]}) 21:59:34 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:34 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:34 executing program 4: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000002340), 0x100020, &(0x7f00000023c0)={[{@mblk_io_submit='mblk_io_submit'}, {@data_err_ignore='data_err=ignore'}, {@noauto_da_alloc='noauto_da_alloc'}]}) [ 737.197410] x_tables: eb_tables: redirect target: used from hooks POSTROUTING, but only usable from PREROUTING/BROUTING 21:59:34 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x248, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2c0) 21:59:34 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:34 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)="6a6673ff", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:59:34 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:34 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000002340), 0x100020, &(0x7f00000023c0)={[{@mblk_io_submit='mblk_io_submit'}, {@data_err_ignore='data_err=ignore'}, {@noauto_da_alloc='noauto_da_alloc'}]}) [ 737.375095] x_tables: eb_tables: redirect target: used from hooks POSTROUTING, but only usable from PREROUTING/BROUTING 21:59:34 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:34 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x248, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2c0) 21:59:34 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 737.549152] x_tables: eb_tables: redirect target: used from hooks POSTROUTING, but only usable from PREROUTING/BROUTING 21:59:34 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isi\ne'}}]}) 21:59:34 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000002340), 0x100020, &(0x7f00000023c0)={[{@mblk_io_submit='mblk_io_submit'}, {@data_err_ignore='data_err=ignore'}, {@noauto_da_alloc='noauto_da_alloc'}]}) 21:59:34 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:34 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:59:34 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:34 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:35 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 737.723895] kernel msg: ebtables bug: please report to author: bad policy 21:59:35 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000002340), 0x100020, &(0x7f00000023c0)={[{@mblk_io_submit='mblk_io_submit'}, {@data_err_ignore='data_err=ignore'}, {@noauto_da_alloc='noauto_da_alloc'}]}) 21:59:35 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:35 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:35 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:59:35 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 737.874724] kernel msg: ebtables bug: please report to author: bad policy 21:59:35 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isiz\n'}}]}) 21:59:35 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:35 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000002340), 0x0, &(0x7f00000023c0)={[{@mblk_io_submit='mblk_io_submit'}, {@data_err_ignore='data_err=ignore'}, {@noauto_da_alloc='noauto_da_alloc'}]}) 21:59:35 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:35 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:35 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jfs\r', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) [ 738.077899] kernel msg: ebtables bug: please report to author: bad policy 21:59:35 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:35 executing program 1: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:59:35 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:35 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000002340), 0x100020, &(0x7f00000023c0)={[{@mblk_io_submit='mblk_io_submit'}, {@data_err_ignore='data_err=ignore'}]}) 21:59:35 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:35 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jfsh', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:59:35 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isiz%'}}]}) 21:59:35 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:35 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:35 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000002340), 0x100020, &(0x7f00000023c0)={[{@mblk_io_submit='mblk_io_submit'}]}) 21:59:35 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:35 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:35 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:35 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)="6a6673f6", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:59:35 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:35 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:35 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000002340), 0x100020, &(0x7f00000023c0)={[{@mblk_io_submit='mblk_io_submit'}]}) 21:59:36 executing program 1: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:59:36 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x5c}}]}) 21:59:36 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:36 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:36 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:59:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000002340), 0x100020, &(0x7f00000023c0)={[{@mblk_io_submit='mblk_io_submit'}]}) 21:59:36 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:36 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:36 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x4000000, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:36 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x700000000000000, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:36 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jfs\n', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:59:36 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000002340), 0x100020, &(0x7f00000023c0)={[{@data_err_ignore='data_err=ignore'}]}) 21:59:36 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x2d}}]}) 21:59:36 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x200000000000000, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:36 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 739.307877] EXT4-fs: 41 callbacks suppressed [ 739.307889] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore, 21:59:36 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:59:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000002340), 0x100020, &(0x7f00000023c0)={[{@data_err_ignore='data_err=ignore'}]}) [ 739.380125] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize-0x0000000000000000" or missing value 21:59:36 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x4000000000000000, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:36 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 739.498275] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize-0x0000000000000000" or missing value [ 739.578174] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore, 21:59:38 executing program 1 (fault-call:1 fault-nth:0): r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:38 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x3000000, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:38 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0xa}}]}) 21:59:38 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:38 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000002340), 0x100020, &(0x7f00000023c0)={[{@data_err_ignore='data_err=ignore'}]}) 21:59:38 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)="6a6673ff", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) [ 741.509160] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 741.533874] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize [ 741.533874] 0x0000000000000000" or missing value 21:59:38 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:38 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x5000000, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 741.556503] FAULT_INJECTION: forcing a failure. [ 741.556503] name failslab, interval 1, probability 0, space 0, times 0 [ 741.595459] CPU: 0 PID: 7716 Comm: syz-executor1 Not tainted 4.19.0+ #92 [ 741.602319] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 741.602327] Call Trace: [ 741.602353] dump_stack+0x244/0x39d [ 741.602379] ? dump_stack_print_info.cold.1+0x20/0x20 [ 741.602406] ? __local_bh_enable_ip+0x160/0x260 [ 741.623158] should_fail.cold.4+0xa/0x17 [ 741.623181] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 741.623195] ? release_sock+0x1ec/0x2c0 [ 741.623214] ? release_sock+0x1ec/0x2c0 [ 741.637029] ? lock_acquire+0x1ed/0x520 [ 741.637048] ? nf_sockopt_find.constprop.0+0x2d/0x290 [ 741.637094] ? find_held_lock+0x36/0x1c0 [ 741.645029] ? mwifiex_cfg80211_assoc+0xd48/0xd80 [ 741.645063] ? perf_trace_sched_process_exec+0x860/0x860 [ 741.645098] __should_failslab+0x124/0x180 [ 741.672839] should_failslab+0x9/0x14 [ 741.676661] kmem_cache_alloc_node_trace+0x270/0x740 [ 741.681775] ? __might_fault+0x12b/0x1e0 [ 741.685867] __get_vm_area_node+0x130/0x3a0 [ 741.690194] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 741.695483] __vmalloc_node_range+0xc4/0x750 [ 741.699899] ? do_replace+0x23b/0x4c0 [ 741.699924] ? do_replace+0x23b/0x4c0 [ 741.699942] vmalloc+0x6f/0x80 [ 741.699957] ? do_replace+0x23b/0x4c0 [ 741.699975] do_replace+0x23b/0x4c0 [ 741.707620] ? do_replace_finish+0x2940/0x2940 [ 741.722822] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 741.728417] ? ns_capable_common+0x13f/0x170 [ 741.728442] do_ebt_set_ctl+0xe7/0x110 [ 741.728469] nf_setsockopt+0x7d/0xd0 [ 741.740457] ip_setsockopt+0xd8/0xf0 [ 741.744188] udp_setsockopt+0x62/0xa0 [ 741.744210] ipv6_setsockopt+0x149/0x170 [ 741.744249] udpv6_setsockopt+0x62/0xa0 [ 741.756077] sock_common_setsockopt+0x9a/0xe0 [ 741.760592] __sys_setsockopt+0x1ba/0x3c0 [ 741.764769] ? kernel_accept+0x310/0x310 [ 741.768852] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 741.773461] ? trace_hardirqs_on+0xbd/0x310 [ 741.777797] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 741.783195] ? trace_hardirqs_off_caller+0x310/0x310 [ 741.788322] __x64_sys_setsockopt+0xbe/0x150 [ 741.792755] do_syscall_64+0x1b9/0x820 [ 741.796660] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 741.802040] ? syscall_return_slowpath+0x5e0/0x5e0 [ 741.806983] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 741.811852] ? trace_hardirqs_on_caller+0x310/0x310 [ 741.816881] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 741.821909] ? prepare_exit_to_usermode+0x291/0x3b0 [ 741.826943] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 741.831820] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 741.837021] RIP: 0033:0x457569 [ 741.840224] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 21:59:38 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) [ 741.859142] RSP: 002b:00007fbceeb7dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 741.866864] RAX: ffffffffffffffda RBX: 00007fbceeb7dc90 RCX: 0000000000457569 [ 741.874138] RDX: 0000000000000080 RSI: 4000000000000000 RDI: 0000000000000003 [ 741.881422] RBP: 000000000072bf00 R08: 00000000000002f0 R09: 0000000000000000 [ 741.888698] R10: 00000000200000c0 R11: 0000000000000246 R12: 00007fbceeb7e6d4 [ 741.895977] R13: 00000000004c3c88 R14: 00000000004d5f80 R15: 0000000000000004 [ 741.911900] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore, [ 741.935721] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize [ 741.935721] 0x0000000000000000" or missing value [ 741.949805] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 21:59:39 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x20000, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:39 executing program 4 (fault-call:2 fault-nth:0): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000002340), 0x100020, &(0x7f00000023c0)={[{@mblk_io_submit='mblk_io_submit'}, {@data_err_ignore='data_err=ignore'}]}) 21:59:39 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 742.040111] syz-executor1: vmalloc: allocation failure: 256 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) [ 742.086573] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 742.103351] syz-executor1 cpuset=syz1 mems_allowed=0 [ 742.108538] CPU: 1 PID: 7716 Comm: syz-executor1 Not tainted 4.19.0+ #92 [ 742.115401] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 742.124767] Call Trace: [ 742.127385] dump_stack+0x244/0x39d [ 742.127408] ? dump_stack_print_info.cold.1+0x20/0x20 [ 742.127463] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 742.127505] warn_alloc.cold.116+0xb7/0x1bd [ 742.136307] ? zone_watermark_ok_safe+0x3f0/0x3f0 [ 742.136327] ? __get_vm_area_node+0x130/0x3a0 [ 742.136346] ? rcu_read_lock_sched_held+0x14f/0x180 [ 742.136368] ? __might_fault+0x12b/0x1e0 [ 742.136391] ? __get_vm_area_node+0x2e5/0x3a0 [ 742.151644] FAULT_INJECTION: forcing a failure. [ 742.151644] name failslab, interval 1, probability 0, space 0, times 0 [ 742.155543] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 742.155575] __vmalloc_node_range+0x472/0x750 [ 742.155600] ? do_replace+0x23b/0x4c0 [ 742.193868] vmalloc+0x6f/0x80 [ 742.197071] ? do_replace+0x23b/0x4c0 [ 742.200887] do_replace+0x23b/0x4c0 [ 742.204527] ? do_replace_finish+0x2940/0x2940 [ 742.209133] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 742.214685] ? ns_capable_common+0x13f/0x170 [ 742.219103] do_ebt_set_ctl+0xe7/0x110 [ 742.223011] nf_setsockopt+0x7d/0xd0 [ 742.226735] ip_setsockopt+0xd8/0xf0 [ 742.230618] udp_setsockopt+0x62/0xa0 [ 742.234436] ipv6_setsockopt+0x149/0x170 [ 742.238508] udpv6_setsockopt+0x62/0xa0 [ 742.242502] sock_common_setsockopt+0x9a/0xe0 [ 742.247014] __sys_setsockopt+0x1ba/0x3c0 [ 742.251174] ? kernel_accept+0x310/0x310 [ 742.255256] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 742.259860] ? trace_hardirqs_on+0xbd/0x310 [ 742.264198] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 742.269585] ? trace_hardirqs_off_caller+0x310/0x310 [ 742.274704] __x64_sys_setsockopt+0xbe/0x150 [ 742.279132] do_syscall_64+0x1b9/0x820 [ 742.283032] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 742.288404] ? syscall_return_slowpath+0x5e0/0x5e0 [ 742.293343] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 742.298194] ? trace_hardirqs_on_caller+0x310/0x310 [ 742.303222] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 742.308257] ? prepare_exit_to_usermode+0x291/0x3b0 [ 742.313287] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 742.318156] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 742.323356] RIP: 0033:0x457569 [ 742.327026] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 742.345930] RSP: 002b:00007fbceeb7dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 742.353651] RAX: ffffffffffffffda RBX: 00007fbceeb7dc90 RCX: 0000000000457569 [ 742.360928] RDX: 0000000000000080 RSI: 4000000000000000 RDI: 0000000000000003 [ 742.368200] RBP: 000000000072bf00 R08: 00000000000002f0 R09: 0000000000000000 [ 742.375482] R10: 00000000200000c0 R11: 0000000000000246 R12: 00007fbceeb7e6d4 [ 742.382755] R13: 00000000004c3c88 R14: 00000000004d5f80 R15: 0000000000000004 [ 742.391719] CPU: 0 PID: 7732 Comm: syz-executor4 Not tainted 4.19.0+ #92 [ 742.397906] Mem-Info: [ 742.398586] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 742.401055] active_anon:133409 inactive_anon:131 isolated_anon:0 [ 742.401055] active_file:13033 inactive_file:36794 isolated_file:0 [ 742.401055] unevictable:0 dirty:207 writeback:0 unstable:0 [ 742.401055] slab_reclaimable:15537 slab_unreclaimable:105192 [ 742.401055] mapped:55115 shmem:138 pagetables:1069 bounce:0 [ 742.401055] free:1238256 free_pcp:1036 free_cma:0 [ 742.410333] Call Trace: [ 742.410358] dump_stack+0x244/0x39d [ 742.410380] ? dump_stack_print_info.cold.1+0x20/0x20 [ 742.410432] ? lock_downgrade+0x900/0x900 [ 742.445433] Node 0 active_anon:533636kB inactive_anon:524kB active_file:52132kB inactive_file:147176kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:220460kB dirty:828kB writeback:0kB shmem:552kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 360448kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 742.447028] should_fail.cold.4+0xa/0x17 [ 742.447050] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 742.451008] Node 0 DMA free:15908kB min:164kB low:204kB high:244kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 742.455864] ? lock_downgrade+0x900/0x900 [ 742.455886] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 742.460343] lowmem_reserve[]: 0 2818 6321 6321 [ 742.488218] ? proc_fail_nth_write+0x9e/0x210 [ 742.488235] ? proc_cwd_link+0x1d0/0x1d0 [ 742.488261] ? find_held_lock+0x36/0x1c0 [ 742.488291] ? raid5_remove_disk+0xe68/0xfd0 [ 742.492730] Node 0 DMA32 free:2886172kB min:30052kB low:37564kB high:45076kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:2888768kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:1912kB local_pcp:504kB free_cma:0kB [ 742.497446] ? perf_trace_sched_process_exec+0x860/0x860 [ 742.497469] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 742.524117] lowmem_reserve[]: 0 0 3503 3503 [ 742.527771] __should_failslab+0x124/0x180 [ 742.527795] should_failslab+0x9/0x14 [ 742.533688] Node 0 Normal free:2050944kB min:37364kB low:46704kB high:56044kB active_anon:533636kB inactive_anon:524kB active_file:52132kB inactive_file:147176kB unevictable:0kB writepending:828kB present:4718592kB managed:3587820kB mlocked:0kB kernel_stack:5696kB pagetables:4276kB bounce:0kB free_pcp:2220kB local_pcp:1064kB free_cma:0kB [ 742.537921] __kmalloc+0x2e0/0x760 [ 742.537942] ? strncpy_from_user+0x5a0/0x5a0 [ 742.537962] ? fput+0x130/0x1a0 [ 742.542774] lowmem_reserve[]: 0 0 0 0 [ 742.546502] ? do_syscall_64+0x9a/0x820 [ 742.546517] ? __x64_sys_memfd_create+0x142/0x4f0 [ 742.546536] ? do_syscall_64+0x9a/0x820 [ 742.550928] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 742.554992] __x64_sys_memfd_create+0x142/0x4f0 [ 742.555009] ? memfd_fcntl+0x1910/0x1910 [ 742.555036] do_syscall_64+0x1b9/0x820 [ 742.583245] Node 0 DMA32: 3*4kB (UM) 4*8kB (UM) 3*16kB (UM) 4*32kB (UM) 5*64kB (UM) 6*128kB (UM) 5*256kB (UM) 4*512kB (M) 4*1024kB (UM) 1*2048kB (M) 702*4096kB (UM) = 2886172kB [ 742.588226] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 742.588247] ? syscall_return_slowpath+0x5e0/0x5e0 [ 742.588269] ? trace_hardirqs_on_caller+0x310/0x310 [ 742.594268] Node 0 Normal: 3660*4kB (UME) 2638*8kB (UME) 4096*16kB (UME) 2570*32kB (UME) 1376*64kB (UME) 543*128kB (UM) 277*256kB (U) 185*512kB (UE) 136*1024kB (U) 80*2048kB (U) 303*4096kB (UM) = 2050912kB [ 742.598114] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 742.598136] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 742.598157] ? __switch_to_asm+0x40/0x70 [ 742.602724] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 742.606172] ? __switch_to_asm+0x34/0x70 [ 742.606195] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 742.606220] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 742.636718] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 742.639770] RIP: 0033:0x457569 [ 742.639789] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 742.639798] RSP: 002b:00007f75db8d5a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 742.639825] RAX: ffffffffffffffda RBX: 0000000020002340 RCX: 0000000000457569 [ 742.639839] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a [ 742.644591] 49964 total pagecache pages [ 742.647506] RBP: 000000000072bfa0 R08: 0000000000100020 R09: 00000000fbad8001 [ 742.647516] R10: 0000000020002340 R11: 0000000000000246 R12: 00007f75db8d66d4 [ 742.647525] R13: 00000000004c4c8f R14: 00000000004d8290 R15: 0000000000000003 [ 742.811183] 0 pages in swap cache [ 742.825268] Swap cache stats: add 0, delete 0, find 0/0 [ 742.867705] Free swap = 0kB [ 742.879043] Total swap = 0kB [ 742.882079] 1965979 pages RAM [ 742.882086] 0 pages HighMem/MovableOnly 21:59:40 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:40 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x25}}]}) 21:59:40 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jfsl', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:59:40 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x7fffffe, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:40 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:40 executing program 4 (fault-call:2 fault-nth:1): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000002340), 0x100020, &(0x7f00000023c0)={[{@mblk_io_submit='mblk_io_submit'}, {@data_err_ignore='data_err=ignore'}]}) [ 742.882091] 342855 pages reserved [ 742.882096] 0 pages cma reserved 21:59:40 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 742.963002] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 21:59:40 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0xffffffff00000000, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 743.014871] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize%0x0000000000000000" or missing value 21:59:40 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:40 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x200000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:40 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) [ 743.139124] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize%0x0000000000000000" or missing value [ 743.164774] FAULT_INJECTION: forcing a failure. [ 743.164774] name failslab, interval 1, probability 0, space 0, times 0 [ 743.232310] CPU: 1 PID: 7756 Comm: syz-executor4 Not tainted 4.19.0+ #92 [ 743.239193] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 743.239201] Call Trace: [ 743.239228] dump_stack+0x244/0x39d [ 743.239254] ? dump_stack_print_info.cold.1+0x20/0x20 [ 743.239290] should_fail.cold.4+0xa/0x17 [ 743.239314] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 743.254866] ? find_held_lock+0x36/0x1c0 [ 743.254895] ? zap_class+0x640/0x640 [ 743.276981] ? __lock_acquire+0x62f/0x4c20 [ 743.281228] ? lock_downgrade+0x900/0x900 [ 743.285388] ? check_preemption_disabled+0x48/0x280 [ 743.290420] ? find_held_lock+0x36/0x1c0 [ 743.294497] ? printk_safe_log_store+0x8/0x2f0 [ 743.299116] ? expand_files.part.8+0x571/0x9a0 [ 743.304027] ? perf_trace_sched_process_exec+0x860/0x860 [ 743.309494] ? find_held_lock+0x36/0x1c0 [ 743.313575] __should_failslab+0x124/0x180 [ 743.317835] should_failslab+0x9/0x14 [ 743.321648] kmem_cache_alloc+0x2be/0x730 [ 743.321691] ? shmem_destroy_callback+0xc0/0xc0 [ 743.321723] shmem_alloc_inode+0x1b/0x40 [ 743.321745] alloc_inode+0x63/0x190 [ 743.330553] new_inode_pseudo+0x71/0x1a0 [ 743.330576] ? prune_icache_sb+0x1c0/0x1c0 [ 743.330600] ? _raw_spin_unlock+0x2c/0x50 [ 743.330620] new_inode+0x1c/0x40 [ 743.354070] shmem_get_inode+0xf1/0x920 [ 743.358057] ? shmem_encode_fh+0x340/0x340 [ 743.362777] ? lock_downgrade+0x900/0x900 [ 743.366949] ? lock_release+0xa00/0xa00 [ 743.370938] ? perf_trace_sched_process_exec+0x860/0x860 [ 743.376406] ? usercopy_warn+0x110/0x110 [ 743.380489] __shmem_file_setup.part.50+0x83/0x2a0 [ 743.385444] shmem_file_setup+0x65/0x90 [ 743.389431] __x64_sys_memfd_create+0x2af/0x4f0 [ 743.394118] ? memfd_fcntl+0x1910/0x1910 [ 743.398202] do_syscall_64+0x1b9/0x820 [ 743.402100] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 743.407477] ? syscall_return_slowpath+0x5e0/0x5e0 [ 743.412419] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 743.417272] ? trace_hardirqs_on_caller+0x310/0x310 [ 743.422299] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 743.427328] ? prepare_exit_to_usermode+0x291/0x3b0 [ 743.432363] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 743.437227] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 743.442421] RIP: 0033:0x457569 [ 743.445624] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 743.464536] RSP: 002b:00007f75db8f6a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 743.472255] RAX: ffffffffffffffda RBX: 0000000020002340 RCX: 0000000000457569 21:59:40 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:40 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3b}}]}) 21:59:40 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x500000000000000, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 743.479527] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a [ 743.486819] RBP: 000000000072bf00 R08: 0000000000100020 R09: 00000000fbad8001 [ 743.494093] R10: 0000000020002340 R11: 0000000000000246 R12: 00007f75db8f76d4 [ 743.501372] R13: 00000000004c4c8f R14: 00000000004d8290 R15: 0000000000000003 21:59:40 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000006, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:40 executing program 4 (fault-call:2 fault-nth:2): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000002340), 0x100020, &(0x7f00000023c0)={[{@mblk_io_submit='mblk_io_submit'}, {@data_err_ignore='data_err=ignore'}]}) 21:59:40 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:40 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x4000000, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:40 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000001100, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 743.678292] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize;0x0000000000000000" or missing value 21:59:41 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)="6a6673c0", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:59:41 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:41 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x700, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 743.739733] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 743.755901] FAULT_INJECTION: forcing a failure. [ 743.755901] name failslab, interval 1, probability 0, space 0, times 0 [ 743.839967] CPU: 0 PID: 7783 Comm: syz-executor4 Not tainted 4.19.0+ #92 [ 743.846859] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 743.856215] Call Trace: [ 743.856245] dump_stack+0x244/0x39d [ 743.856272] ? dump_stack_print_info.cold.1+0x20/0x20 [ 743.856302] ? find_held_lock+0x36/0x1c0 [ 743.862513] should_fail.cold.4+0xa/0x17 [ 743.862540] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 743.880958] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 743.885900] ? kasan_check_read+0x11/0x20 [ 743.890107] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 743.895407] ? rcu_softirq_qs+0x20/0x20 [ 743.899395] ? rcu_softirq_qs+0x20/0x20 [ 743.903402] ? unwind_dump+0x190/0x190 [ 743.907309] ? is_bpf_text_address+0xd3/0x170 [ 743.911831] ? kernel_text_address+0x79/0xf0 [ 743.916263] ? __kernel_text_address+0xd/0x40 [ 743.920772] ? unwind_get_return_address+0x61/0xa0 [ 743.925722] ? __save_stack_trace+0x8d/0xf0 [ 743.930081] ? perf_trace_sched_process_exec+0x860/0x860 [ 743.935547] ? save_stack+0x43/0xd0 [ 743.939188] ? kasan_kmalloc+0xc7/0xe0 [ 743.943096] ? kasan_slab_alloc+0x12/0x20 [ 743.947251] ? kmem_cache_alloc+0x12e/0x730 [ 743.951580] ? shmem_alloc_inode+0x1b/0x40 [ 743.955842] __should_failslab+0x124/0x180 [ 743.960099] should_failslab+0x9/0x14 [ 743.963911] kmem_cache_alloc+0x2be/0x730 [ 743.968077] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 743.973110] ? map_id_range_down+0x1ee/0x430 [ 743.977539] new_inode_smack+0x20/0xb0 [ 743.981455] smack_inode_alloc_security+0x92/0x100 [ 743.986414] security_inode_alloc+0x73/0xd0 [ 743.990749] inode_init_always+0x68f/0xd80 [ 743.995001] ? get_nr_inodes+0x120/0x120 [ 743.999081] ? rcu_pm_notify+0xc0/0xc0 [ 744.002993] ? rcu_read_lock_sched_held+0x14f/0x180 [ 744.008024] ? kmem_cache_alloc+0x33a/0x730 [ 744.012363] ? shmem_alloc_inode+0x1b/0x40 [ 744.016604] ? shmem_destroy_callback+0xc0/0xc0 [ 744.021288] alloc_inode+0x80/0x190 [ 744.024925] new_inode_pseudo+0x71/0x1a0 [ 744.028996] ? prune_icache_sb+0x1c0/0x1c0 [ 744.033251] ? _raw_spin_unlock+0x2c/0x50 [ 744.037409] new_inode+0x1c/0x40 [ 744.040804] shmem_get_inode+0xf1/0x920 [ 744.044805] ? shmem_encode_fh+0x340/0x340 [ 744.049063] ? lock_downgrade+0x900/0x900 [ 744.053232] ? lock_release+0xa00/0xa00 [ 744.057213] ? perf_trace_sched_process_exec+0x860/0x860 [ 744.062687] ? usercopy_warn+0x110/0x110 [ 744.066770] __shmem_file_setup.part.50+0x83/0x2a0 [ 744.071719] shmem_file_setup+0x65/0x90 [ 744.075703] __x64_sys_memfd_create+0x2af/0x4f0 [ 744.080383] ? memfd_fcntl+0x1910/0x1910 [ 744.084473] do_syscall_64+0x1b9/0x820 [ 744.088377] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 744.093754] ? syscall_return_slowpath+0x5e0/0x5e0 [ 744.098692] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 744.103563] ? trace_hardirqs_on_caller+0x310/0x310 [ 744.108605] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 744.113635] ? prepare_exit_to_usermode+0x291/0x3b0 [ 744.118671] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 744.123538] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 744.128736] RIP: 0033:0x457569 [ 744.131939] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 744.150848] RSP: 002b:00007f75db8f6a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 744.158562] RAX: ffffffffffffffda RBX: 0000000020002340 RCX: 0000000000457569 [ 744.165845] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a [ 744.173120] RBP: 000000000072bf00 R08: 0000000000100020 R09: 00000000fbad8001 [ 744.180394] R10: 0000000020002340 R11: 0000000000000246 R12: 00007f75db8f76d4 21:59:41 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000600, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:41 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 744.187669] R13: 00000000004c4c8f R14: 00000000004d8290 R15: 0000000000000003 21:59:41 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3}}]}) 21:59:41 executing program 4 (fault-call:2 fault-nth:3): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000002340), 0x100020, &(0x7f00000023c0)={[{@mblk_io_submit='mblk_io_submit'}, {@data_err_ignore='data_err=ignore'}]}) [ 744.232618] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 21:59:41 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x11, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:41 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:41 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x3f00000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:41 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:59:41 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 744.361574] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 744.400250] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 744.455294] FAULT_INJECTION: forcing a failure. [ 744.455294] name failslab, interval 1, probability 0, space 0, times 0 21:59:41 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x7, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 744.499569] EXT4-fs: 1 callbacks suppressed [ 744.499583] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000003, [ 744.500339] CPU: 1 PID: 7810 Comm: syz-executor4 Not tainted 4.19.0+ #92 [ 744.519028] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 744.528398] Call Trace: [ 744.531004] dump_stack+0x244/0x39d [ 744.531028] ? dump_stack_print_info.cold.1+0x20/0x20 [ 744.531059] should_fail.cold.4+0xa/0x17 [ 744.539874] ? fault_create_debugfs_attr+0x1f0/0x1f0 21:59:41 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000007, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 744.539894] ? __kernel_text_address+0xd/0x40 [ 744.539911] ? unwind_get_return_address+0x61/0xa0 [ 744.539936] ? __lockdep_init_map+0x105/0x590 [ 744.539954] ? lockdep_init_map+0x9/0x10 [ 744.539968] ? debug_mutex_init+0x2d/0x60 [ 744.539992] ? find_held_lock+0x36/0x1c0 [ 744.575310] ? perf_trace_sched_process_exec+0x860/0x860 [ 744.580796] __should_failslab+0x124/0x180 [ 744.580831] should_failslab+0x9/0x14 [ 744.580856] kmem_cache_alloc+0x2be/0x730 [ 744.593047] ? mpol_shared_policy_init+0x235/0x650 21:59:41 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 744.597986] ? current_time+0x72/0x1b0 [ 744.601889] __d_alloc+0xc8/0xb90 [ 744.601914] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 744.601932] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 744.601950] ? ktime_get_coarse_real_ts64+0x22e/0x370 [ 744.601970] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 744.615436] ? timespec64_trunc+0xea/0x180 [ 744.615456] ? inode_init_owner+0x340/0x340 [ 744.615480] ? _raw_spin_unlock+0x2c/0x50 [ 744.615499] ? current_time+0x131/0x1b0 [ 744.615521] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 21:59:41 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 744.634876] ? __lockdep_init_map+0x105/0x590 [ 744.634903] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 744.634920] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 744.634944] d_alloc_pseudo+0x1d/0x30 [ 744.634965] alloc_file_pseudo+0x158/0x3f0 [ 744.634984] ? alloc_file+0x4d0/0x4d0 [ 744.648636] ? usercopy_warn+0x110/0x110 [ 744.648669] __shmem_file_setup.part.50+0x110/0x2a0 [ 744.648692] shmem_file_setup+0x65/0x90 [ 744.648710] __x64_sys_memfd_create+0x2af/0x4f0 [ 744.648726] ? memfd_fcntl+0x1910/0x1910 [ 744.648757] do_syscall_64+0x1b9/0x820 [ 744.648782] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 744.664373] ? syscall_return_slowpath+0x5e0/0x5e0 [ 744.664391] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 744.664412] ? trace_hardirqs_on_caller+0x310/0x310 [ 744.664438] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 744.701870] ? prepare_exit_to_usermode+0x291/0x3b0 [ 744.716991] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 744.717023] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 744.717037] RIP: 0033:0x457569 21:59:42 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 744.717054] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 744.717068] RSP: 002b:00007f75db8f6a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 744.771910] RAX: ffffffffffffffda RBX: 0000000020002340 RCX: 0000000000457569 [ 744.779188] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a [ 744.786461] RBP: 000000000072bf00 R08: 0000000000100020 R09: 00000000fbad8001 [ 744.793728] R10: 0000000020002340 R11: 0000000000000246 R12: 00007f75db8f76d4 [ 744.793739] R13: 00000000004c4c8f R14: 00000000004d8290 R15: 0000000000000003 [ 744.810168] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 744.831133] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 744.857166] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000003, 21:59:42 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7}}]}) 21:59:42 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000004000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:42 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:42 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x3f00000000000000, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:42 executing program 4 (fault-call:2 fault-nth:4): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000002340), 0x100020, &(0x7f00000023c0)={[{@mblk_io_submit='mblk_io_submit'}, {@data_err_ignore='data_err=ignore'}]}) 21:59:42 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:59:42 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:42 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000020000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:42 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x7802000000000000, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 745.056063] FAULT_INJECTION: forcing a failure. [ 745.056063] name failslab, interval 1, probability 0, space 0, times 0 [ 745.112991] CPU: 0 PID: 7843 Comm: syz-executor4 Not tainted 4.19.0+ #92 [ 745.119904] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 745.129264] Call Trace: [ 745.131878] dump_stack+0x244/0x39d [ 745.135536] ? dump_stack_print_info.cold.1+0x20/0x20 [ 745.140745] ? __save_stack_trace+0x8d/0xf0 [ 745.145104] should_fail.cold.4+0xa/0x17 [ 745.149187] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 745.154304] ? smack_d_instantiate+0x136/0xea0 [ 745.158908] ? save_stack+0x43/0xd0 [ 745.162548] ? kasan_kmalloc+0xc7/0xe0 [ 745.166461] ? find_held_lock+0x36/0x1c0 [ 745.170539] ? zap_class+0x640/0x640 [ 745.174269] ? find_held_lock+0x36/0x1c0 [ 745.178347] ? perf_trace_ext4_es_find_extent_range_exit+0x188/0x950 [ 745.184873] ? perf_trace_sched_process_exec+0x860/0x860 [ 745.190344] ? lock_downgrade+0x900/0x900 [ 745.190373] __should_failslab+0x124/0x180 [ 745.190395] should_failslab+0x9/0x14 [ 745.190414] kmem_cache_alloc+0x2be/0x730 [ 745.190430] ? d_set_d_op+0x31d/0x410 [ 745.190455] __alloc_file+0xa8/0x470 [ 745.198841] ? file_free_rcu+0xd0/0xd0 [ 745.198860] ? d_instantiate+0x79/0xa0 [ 745.198879] ? lock_downgrade+0x900/0x900 [ 745.198905] ? kasan_check_read+0x11/0x20 [ 745.198920] ? do_raw_spin_unlock+0xa7/0x330 [ 745.198935] ? do_raw_spin_trylock+0x270/0x270 [ 745.198956] alloc_empty_file+0x72/0x170 [ 745.198975] alloc_file+0x5e/0x4d0 [ 745.206923] ? _raw_spin_unlock+0x2c/0x50 [ 745.206946] alloc_file_pseudo+0x261/0x3f0 [ 745.206968] ? alloc_file+0x4d0/0x4d0 [ 745.206988] ? usercopy_warn+0x110/0x110 [ 745.207019] __shmem_file_setup.part.50+0x110/0x2a0 [ 745.207041] shmem_file_setup+0x65/0x90 [ 745.222294] __x64_sys_memfd_create+0x2af/0x4f0 [ 745.222312] ? memfd_fcntl+0x1910/0x1910 [ 745.222343] do_syscall_64+0x1b9/0x820 [ 745.222363] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 745.222382] ? syscall_return_slowpath+0x5e0/0x5e0 [ 745.222398] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 745.222420] ? trace_hardirqs_on_caller+0x310/0x310 [ 745.305140] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 745.310443] ? prepare_exit_to_usermode+0x291/0x3b0 [ 745.315480] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 745.320348] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 745.325542] RIP: 0033:0x457569 [ 745.328744] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 745.347671] RSP: 002b:00007f75db8f6a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 745.355396] RAX: ffffffffffffffda RBX: 0000000020002340 RCX: 0000000000457569 21:59:42 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000004000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:42 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x100000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 745.362680] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a [ 745.369960] RBP: 000000000072bf00 R08: 0000000000100020 R09: 00000000fbad8001 [ 745.377244] R10: 0000000020002340 R11: 0000000000000246 R12: 00007f75db8f76d4 [ 745.384523] R13: 00000000004c4c8f R14: 00000000004d8290 R15: 0000000000000003 [ 745.398246] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000007, 21:59:42 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 745.473255] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000007, 21:59:42 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x700000000000000}}]}) 21:59:42 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x1000000, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:42 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000278, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:42 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)="6a6673f4", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:59:42 executing program 4 (fault-call:2 fault-nth:5): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000002340), 0x100020, &(0x7f00000023c0)={[{@mblk_io_submit='mblk_io_submit'}, {@data_err_ignore='data_err=ignore'}]}) 21:59:42 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 745.590357] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 745.594777] FAULT_INJECTION: forcing a failure. [ 745.594777] name failslab, interval 1, probability 0, space 0, times 0 [ 745.649050] CPU: 0 PID: 7867 Comm: syz-executor4 Not tainted 4.19.0+ #92 [ 745.655939] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 745.665303] Call Trace: [ 745.667910] dump_stack+0x244/0x39d [ 745.671554] ? dump_stack_print_info.cold.1+0x20/0x20 [ 745.676764] ? smk_access_entry+0x310/0x310 [ 745.681105] ? find_held_lock+0x36/0x1c0 [ 745.685190] should_fail.cold.4+0xa/0x17 [ 745.689258] ? find_held_lock+0x36/0x1c0 [ 745.693337] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 745.698469] ? lock_downgrade+0x900/0x900 [ 745.702641] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 745.708198] ? timespec64_trunc+0xea/0x180 [ 745.712451] ? inode_init_owner+0x340/0x340 [ 745.716797] ? find_held_lock+0x36/0x1c0 [ 745.720910] ? perf_trace_sched_process_exec+0x860/0x860 [ 745.726374] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 745.731934] __should_failslab+0x124/0x180 [ 745.736184] should_failslab+0x9/0x14 [ 745.739997] kmem_cache_alloc+0x2be/0x730 [ 745.744161] ? do_sys_ftruncate+0x428/0x550 [ 745.748500] ? lock_downgrade+0x900/0x900 [ 745.752672] getname_flags+0xd0/0x590 [ 745.756488] ? __lock_is_held+0xb5/0x140 [ 745.760578] getname+0x19/0x20 [ 745.763787] do_sys_open+0x383/0x700 [ 745.767522] ? filp_open+0x80/0x80 [ 745.771086] ? trace_hardirqs_off_caller+0x310/0x310 [ 745.776208] ? do_sys_ftruncate+0x449/0x550 [ 745.780529] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 745.780547] __x64_sys_open+0x7e/0xc0 [ 745.780569] do_syscall_64+0x1b9/0x820 [ 745.799013] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 745.804398] ? syscall_return_slowpath+0x5e0/0x5e0 [ 745.809339] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 745.814200] ? trace_hardirqs_on_caller+0x310/0x310 [ 745.819224] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 745.824250] ? prepare_exit_to_usermode+0x291/0x3b0 [ 745.829282] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 745.834154] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 745.839358] RIP: 0033:0x4111a1 [ 745.842567] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 745.861516] RSP: 002b:00007f75db8f6a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 745.869243] RAX: ffffffffffffffda RBX: 0000000020002350 RCX: 00000000004111a1 [ 745.876533] RDX: 00007f75db8f6afa RSI: 0000000000000002 RDI: 00007f75db8f6af0 [ 745.883830] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 745.891116] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 21:59:42 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:42 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000007000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:42 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x3f00, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:43 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:43 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:43 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000005000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 745.898391] R13: 0000000000000000 R14: 00000000004d8290 R15: 0000000000000003 21:59:43 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfcfdffff00000000}}]}) 21:59:43 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x88, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:43 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:43 executing program 4 (fault-call:2 fault-nth:6): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000002340), 0x100020, &(0x7f00000023c0)={[{@mblk_io_submit='mblk_io_submit'}, {@data_err_ignore='data_err=ignore'}]}) 21:59:43 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000003f00, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:43 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) [ 746.182867] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 746.191479] FAULT_INJECTION: forcing a failure. [ 746.191479] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 746.205484] CPU: 0 PID: 7903 Comm: syz-executor4 Not tainted 4.19.0+ #92 [ 746.212335] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 746.221700] Call Trace: [ 746.224304] dump_stack+0x244/0x39d [ 746.227954] ? dump_stack_print_info.cold.1+0x20/0x20 [ 746.233174] should_fail.cold.4+0xa/0x17 [ 746.237257] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 746.242377] ? print_usage_bug+0xc0/0xc0 [ 746.246464] ? mark_held_locks+0x130/0x130 [ 746.250711] ? zap_class+0x640/0x640 [ 746.254437] ? smk_access+0x53b/0x700 [ 746.258250] ? print_usage_bug+0xc0/0xc0 [ 746.262328] ? zap_class+0x640/0x640 [ 746.262347] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 746.262366] ? smack_log+0x423/0x590 [ 746.262389] ? find_held_lock+0x36/0x1c0 [ 746.262412] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 746.262434] ? should_fail+0x22d/0xd01 [ 746.271683] ? find_held_lock+0x36/0x1c0 [ 746.284979] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 746.285008] __alloc_pages_nodemask+0x34b/0xde0 [ 746.285032] ? __alloc_pages_slowpath+0x2e10/0x2e10 [ 746.285053] ? inode_init_owner+0x340/0x340 [ 746.285084] ? find_held_lock+0x36/0x1c0 [ 746.302775] ? l2cap_chan_send+0x2478/0x45f0 [ 746.302886] ? trace_hardirqs_off+0xb8/0x310 [ 746.302915] cache_grow_begin+0xa5/0x8c0 [ 746.329153] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 746.334709] ? check_preemption_disabled+0x48/0x280 [ 746.339744] kmem_cache_alloc+0x66b/0x730 [ 746.343900] ? do_sys_ftruncate+0x428/0x550 [ 746.348251] getname_flags+0xd0/0x590 [ 746.352064] ? __lock_is_held+0xb5/0x140 [ 746.356143] getname+0x19/0x20 [ 746.359349] do_sys_open+0x383/0x700 [ 746.363089] ? filp_open+0x80/0x80 [ 746.366647] ? trace_hardirqs_off_caller+0x310/0x310 [ 746.366664] ? do_sys_ftruncate+0x449/0x550 [ 746.366686] __x64_sys_open+0x7e/0xc0 [ 746.366708] do_syscall_64+0x1b9/0x820 [ 746.366729] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 746.366750] ? syscall_return_slowpath+0x5e0/0x5e0 [ 746.383839] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 746.383863] ? trace_hardirqs_on_caller+0x310/0x310 [ 746.383882] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 746.383901] ? prepare_exit_to_usermode+0x291/0x3b0 [ 746.383926] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 746.418905] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 746.424112] RIP: 0033:0x4111a1 [ 746.427317] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 746.446233] RSP: 002b:00007f75db8f6a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 746.453957] RAX: ffffffffffffffda RBX: 0000000020002350 RCX: 00000000004111a1 [ 746.461232] RDX: 00007f75db8f6afa RSI: 0000000000000002 RDI: 00007f75db8f6af0 [ 746.461242] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 746.461252] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 21:59:43 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0xfeffff0700000000, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:43 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:43 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:43 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:43 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:43 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000500, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 746.461261] R13: 0000000000000000 R14: 00000000004d8290 R15: 0000000000000003 [ 746.529484] EXT4-fs (sda1): Ignoring removed mblk_io_submit option [ 746.541258] EXT4-fs (sda1): re-mounted. Opts: mblk_io_submit,data_err=ignore, 21:59:44 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x8cffffff}}]}) 21:59:44 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x88000000, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:44 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:59:44 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000004, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:44 executing program 4 (fault-call:2 fault-nth:7): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000002340), 0x100020, &(0x7f00000023c0)={[{@mblk_io_submit='mblk_io_submit'}, {@data_err_ignore='data_err=ignore'}]}) 21:59:44 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:44 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000005, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:44 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:44 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x300, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 746.883649] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 746.902499] FAULT_INJECTION: forcing a failure. [ 746.902499] name failslab, interval 1, probability 0, space 0, times 0 [ 746.977439] CPU: 1 PID: 7932 Comm: syz-executor4 Not tainted 4.19.0+ #92 [ 746.984329] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 746.993691] Call Trace: [ 746.996303] dump_stack+0x244/0x39d [ 746.999954] ? dump_stack_print_info.cold.1+0x20/0x20 [ 747.005161] ? print_usage_bug+0xc0/0xc0 [ 747.009251] should_fail.cold.4+0xa/0x17 [ 747.013325] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 747.018434] ? zap_class+0x640/0x640 [ 747.022174] ? __lock_acquire+0x62f/0x4c20 [ 747.026437] ? find_held_lock+0x36/0x1c0 [ 747.030533] ? perf_trace_sched_process_exec+0x860/0x860 [ 747.036008] __should_failslab+0x124/0x180 [ 747.040265] should_failslab+0x9/0x14 [ 747.044081] kmem_cache_alloc+0x2be/0x730 [ 747.048242] ? zap_class+0x640/0x640 [ 747.051966] ? print_usage_bug+0xc0/0xc0 [ 747.056039] ? mark_held_locks+0x130/0x130 [ 747.060293] __alloc_file+0xa8/0x470 [ 747.064026] ? file_free_rcu+0xd0/0xd0 [ 747.067933] ? find_held_lock+0x36/0x1c0 [ 747.072019] ? is_bpf_text_address+0xac/0x170 [ 747.076524] ? lock_downgrade+0x900/0x900 [ 747.080683] ? check_preemption_disabled+0x48/0x280 [ 747.084354] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 747.085719] alloc_empty_file+0x72/0x170 [ 747.085745] path_openat+0x170/0x5150 [ 747.085761] ? rcu_softirq_qs+0x20/0x20 [ 747.085776] ? unwind_dump+0x190/0x190 [ 747.085802] ? zap_class+0x640/0x640 [ 747.085836] ? path_lookupat.isra.43+0xc00/0xc00 [ 747.120722] ? unwind_get_return_address+0x61/0xa0 [ 747.125672] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 747.130707] ? expand_files.part.8+0x571/0x9a0 [ 747.135339] ? find_held_lock+0x36/0x1c0 [ 747.139423] ? __alloc_fd+0x347/0x6e0 [ 747.143243] ? lock_downgrade+0x900/0x900 [ 747.147398] ? getname+0x19/0x20 [ 747.150787] ? kasan_check_read+0x11/0x20 [ 747.154959] ? do_raw_spin_unlock+0xa7/0x330 [ 747.159383] ? do_raw_spin_trylock+0x270/0x270 [ 747.163985] ? __lock_is_held+0xb5/0x140 [ 747.168063] ? __check_object_size+0xb1/0x782 [ 747.172594] ? _raw_spin_unlock+0x2c/0x50 [ 747.176762] ? __alloc_fd+0x347/0x6e0 [ 747.180593] do_filp_open+0x255/0x380 [ 747.180611] ? may_open_dev+0x100/0x100 [ 747.180644] ? get_unused_fd_flags+0x122/0x1a0 [ 747.180660] ? __alloc_fd+0x6e0/0x6e0 [ 747.180679] ? __lock_is_held+0xb5/0x140 [ 747.180701] do_sys_open+0x568/0x700 [ 747.180719] ? filp_open+0x80/0x80 [ 747.193066] ? trace_hardirqs_off_caller+0x310/0x310 [ 747.193083] ? do_sys_ftruncate+0x449/0x550 [ 747.193105] __x64_sys_open+0x7e/0xc0 [ 747.193127] do_syscall_64+0x1b9/0x820 21:59:44 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x278, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 747.193148] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 747.193172] ? syscall_return_slowpath+0x5e0/0x5e0 [ 747.235625] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 747.240486] ? trace_hardirqs_on_caller+0x310/0x310 [ 747.245513] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 747.250552] ? prepare_exit_to_usermode+0x291/0x3b0 [ 747.255602] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 747.260477] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 747.260695] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 21:59:44 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:44 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000088000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 747.265674] RIP: 0033:0x4111a1 [ 747.265692] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 747.265701] RSP: 002b:00007f75db8f6a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 747.265717] RAX: ffffffffffffffda RBX: 0000000020002350 RCX: 00000000004111a1 [ 747.265727] RDX: 00007f75db8f6afa RSI: 0000000000000002 RDI: 00007f75db8f6af0 [ 747.265737] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 747.265746] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 747.265756] R13: 0000000000000000 R14: 00000000004d8290 R15: 0000000000000003 21:59:44 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x2d000000}}]}) 21:59:44 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000078020000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:44 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:44 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x4, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:44 executing program 4 (fault-call:2 fault-nth:8): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f83f0080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000002340), 0x100020, &(0x7f00000023c0)={[{@mblk_io_submit='mblk_io_submit'}, {@data_err_ignore='data_err=ignore'}]}) 21:59:44 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard_size={'discard'}}]}) 21:59:44 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:44 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000002000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 747.560264] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 747.572555] FAULT_INJECTION: forcing a failure. [ 747.572555] name failslab, interval 1, probability 0, space 0, times 0 [ 747.616524] CPU: 1 PID: 7961 Comm: syz-executor4 Not tainted 4.19.0+ #92 [ 747.623425] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 747.632781] Call Trace: [ 747.632821] dump_stack+0x244/0x39d [ 747.632850] ? dump_stack_print_info.cold.1+0x20/0x20 [ 747.639061] should_fail.cold.4+0xa/0x17 [ 747.639082] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 747.639101] ? down_write_nested+0x130/0x130 [ 747.639116] ? down_read+0x120/0x120 [ 747.639144] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 747.667109] ? zap_class+0x640/0x640 [ 747.670843] ? lock_acquire+0x1ed/0x520 [ 747.674839] ? lo_ioctl+0x8e/0x1d60 [ 747.678485] ? find_held_lock+0x36/0x1c0 [ 747.682556] ? __lock_is_held+0xb5/0x140 [ 747.682597] ? perf_trace_sched_process_exec+0x860/0x860 [ 747.682626] __should_failslab+0x124/0x180 [ 747.682648] should_failslab+0x9/0x14 [ 747.692156] kmem_cache_alloc_trace+0x2d7/0x750 [ 747.704914] ? check_preemption_disabled+0x48/0x280 [ 747.709964] __kthread_create_on_node+0x137/0x540 [ 747.714833] ? loop_get_status64+0x140/0x140 [ 747.719254] ? kthread_parkme+0xb0/0xb0 [ 747.723262] ? __lockdep_init_map+0x105/0x590 [ 747.727822] ? __lockdep_init_map+0x105/0x590 [ 747.732336] ? loop_get_status64+0x140/0x140 [ 747.736763] kthread_create_on_node+0xb1/0xe0 [ 747.741271] ? __kthread_create_on_node+0x540/0x540 [ 747.746310] ? kasan_check_read+0x11/0x20 [ 747.750480] lo_ioctl+0x7f6/0x1d60 [ 747.750522] ? lo_rw_aio+0x1ef0/0x1ef0 [ 747.750542] blkdev_ioctl+0x98e/0x21b0 [ 747.750560] ? blkpg_ioctl+0xc10/0xc10 [ 747.750587] ? lock_downgrade+0x900/0x900 [ 747.758000] ? check_preemption_disabled+0x48/0x280 [ 747.758022] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 747.758041] ? kasan_check_read+0x11/0x20 [ 747.758060] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 747.789354] ? rcu_softirq_qs+0x20/0x20 [ 747.793357] ? __fget+0x4d1/0x740 [ 747.796839] ? ksys_dup3+0x680/0x680 [ 747.800585] block_ioctl+0xee/0x130 [ 747.804221] ? blkdev_fallocate+0x400/0x400 [ 747.808559] do_vfs_ioctl+0x1de/0x1720 [ 747.812473] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 747.818027] ? ioctl_preallocate+0x300/0x300 [ 747.822450] ? memset+0x31/0x40 [ 747.825747] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 747.831298] ? smack_file_ioctl+0x210/0x3c0 [ 747.835629] ? fget_raw+0x20/0x20 [ 747.839094] ? smack_file_lock+0x2e0/0x2e0 [ 747.843343] ? rcu_read_lock_sched_held+0x14f/0x180 [ 747.848379] ? do_syscall_64+0x9a/0x820 [ 747.852363] ? do_syscall_64+0x9a/0x820 [ 747.856352] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 747.861902] ? security_file_ioctl+0x94/0xc0 [ 747.866329] ksys_ioctl+0xa9/0xd0 [ 747.869799] __x64_sys_ioctl+0x73/0xb0 [ 747.873715] do_syscall_64+0x1b9/0x820 [ 747.877622] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 747.883001] ? syscall_return_slowpath+0x5e0/0x5e0 [ 747.887943] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 747.892801] ? trace_hardirqs_on_caller+0x310/0x310 [ 747.897851] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 747.902885] ? prepare_exit_to_usermode+0x291/0x3b0 [ 747.907928] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 747.912799] entry_SYSCALL_64_after_hwframe+0x49/0xbe 21:59:45 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) 21:59:45 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000003, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x5, &(0x7f0000000080), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 21:59:45 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000080), &(0x7f0000000600)=[{0x6, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 747.918011] RIP: 0033:0x4573d7 [ 747.918029] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 747.918038] RSP: 002b:00007f75db8f6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 747.940504] RAX: ffffffffffffffda RBX: 0000000020002350 RCX: 00000000004573d7 [ 747.940514] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 747.940522] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 747.940530] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 747.940539] R13: 0000000000000000 R14: 00000000004d8290 R15: 0000000000000003 [ 748.007520] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 21:59:45 executing program 0: ustat(0xf, &(0x7f0000000080)={0x0}) [ 748.091492] ================================================================== [ 748.098496] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x000000002d000000, [ 748.099525] BUG: KASAN: slab-out-of-bounds in __ext4_expand_extra_isize+0x16f/0x240 [ 748.099608] Write of size 754974688 at addr ffff8801c22722a0 by task rs:main Q:Reg/5578 [ 748.099612] [ 748.099634] CPU: 0 PID: 5578 Comm: rs:main Q:Reg Not tainted 4.19.0+ #92 [ 748.110390] EXT4-fs error (device sda1): ext4_expand_extra_isize_ea:2727: inode #16486: comm syz-executor5: corrupted in-inode xattr [ 748.115647] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 748.115653] Call Trace: [ 748.115676] dump_stack+0x244/0x39d [ 748.115697] ? dump_stack_print_info.cold.1+0x20/0x20 [ 748.115710] ? printk+0xa7/0xcf [ 748.115725] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 748.115750] print_address_description.cold.7+0x9/0x1ff [ 748.115770] kasan_report.cold.8+0x242/0x309 [ 748.115789] ? __ext4_expand_extra_isize+0x16f/0x240 [ 748.115822] check_memory_region+0x13e/0x1b0 [ 748.115840] memset+0x23/0x40 [ 748.146179] EXT4-fs error (device sda1): ext4_expand_extra_isize_ea:2727: inode #16514: comm syz-executor0: corrupted in-inode xattr [ 748.154035] __ext4_expand_extra_isize+0x16f/0x240 [ 748.154057] ext4_mark_inode_dirty+0x8f9/0xb20 [ 748.154085] ? ext4_expand_extra_isize+0x5b0/0x5b0 [ 748.154102] ? __might_sleep+0x95/0x190 [ 748.154125] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 748.231983] ? ext4_journal_abort_handle.isra.5+0x260/0x260 [ 748.237711] ? __lock_is_held+0xb5/0x140 [ 748.241790] ? ext4_setattr+0x28f0/0x28f0 [ 748.245965] ext4_dirty_inode+0x97/0xc0 [ 748.249954] __mark_inode_dirty+0x7c3/0x1510 [ 748.254378] ? __inode_attach_wb+0x13f0/0x13f0 [ 748.258983] ? mark_buffer_dirty+0x1c6/0x8d0 [ 748.263402] ? __lock_is_held+0xb5/0x140 [ 748.267471] ? buffer_io_error+0xa0/0xa0 [ 748.271550] ? wait_for_stable_page+0x1a5/0x570 [ 748.276231] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 748.281775] ? unlock_page+0x2c2/0x4c0 [ 748.285677] ? wake_up_page_bit+0x6f0/0x6f0 [ 748.290015] ? __might_sleep+0x95/0x190 [ 748.294000] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 748.299548] ? __block_commit_write.isra.37+0x301/0x3f0 [ 748.304941] __generic_write_end+0x320/0x400 [ 748.309369] ? remove_inode_buffers+0x3f0/0x3f0 [ 748.314045] ? block_write_end+0xab/0x230 [ 748.318209] ? page_zero_new_buffers+0x8f0/0x8f0 [ 748.322979] ? __lock_is_held+0xb5/0x140 [ 748.327053] generic_write_end+0x6c/0x90 [ 748.331137] ext4_da_write_end+0x2e0/0xcd0 [ 748.335381] ? kasan_check_write+0x14/0x20 [ 748.339634] ? ext4_write_end+0x10c0/0x10c0 [ 748.343972] ? _copy_to_iter_mcsafe+0x15d0/0x15d0 [ 748.348837] ? __sanitizer_cov_trace_pc+0x4e/0x50 [ 748.353689] ? ktime_get_coarse_real_ts64+0x22e/0x370 [ 748.358887] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 748.364438] ? timespec64_trunc+0xea/0x180 [ 748.368684] ? inode_init_owner+0x340/0x340 [ 748.373019] ? drop_futex_key_refs.isra.14+0x6d/0xe0 [ 748.378138] ? ext4_write_end+0x10c0/0x10c0 [ 748.382475] generic_perform_write+0x4ca/0x6a0 [ 748.387088] ? add_page_wait_queue+0x400/0x400 [ 748.391683] ? current_time+0x1b0/0x1b0 [ 748.395668] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 748.400696] ? generic_write_checks+0x382/0x5d0 [ 748.405379] ? wait_on_page_locked_killable+0x520/0x520 [ 748.410754] ? ext4_file_write_iter+0x2a1/0x1420 [ 748.415523] __generic_file_write_iter+0x26e/0x630 [ 748.420470] ext4_file_write_iter+0x390/0x1420 [ 748.425079] ? ext4_file_mmap+0x410/0x410 [ 748.429248] ? ksys_dup3+0x680/0x680 [ 748.432978] ? zap_class+0x640/0x640 [ 748.436701] ? lock_downgrade+0x900/0x900 [ 748.440864] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 748.445635] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 748.451181] ? iov_iter_init+0xc2/0x1e0 [ 748.455164] __vfs_write+0x6b8/0x9f0 [ 748.458897] ? kernel_read+0x120/0x120 [ 748.462798] ? __lock_is_held+0xb5/0x140 [ 748.466896] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 748.472446] ? __sb_start_write+0x1b2/0x370 [ 748.476783] vfs_write+0x1fc/0x560 [ 748.480349] ksys_write+0x101/0x260 [ 748.483987] ? __ia32_sys_read+0xb0/0xb0 [ 748.488061] ? trace_hardirqs_off_caller+0x310/0x310 [ 748.493199] __x64_sys_write+0x73/0xb0 [ 748.497104] do_syscall_64+0x1b9/0x820 [ 748.501007] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 748.506382] ? syscall_return_slowpath+0x5e0/0x5e0 [ 748.511323] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 748.516180] ? trace_hardirqs_on_caller+0x310/0x310 [ 748.521207] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 748.526752] ? prepare_exit_to_usermode+0x291/0x3b0 [ 748.531788] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 748.536657] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 748.541854] RIP: 0033:0x7fd2b33c719d [ 748.545575] Code: d1 20 00 00 75 10 b8 01 00 00 00 0f 05 48 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 be fa ff ff 48 89 04 24 b8 01 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 07 fb ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 748.564488] RSP: 002b:00007fd2b1967f90 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 748.572208] RAX: ffffffffffffffda RBX: 0000000000000400 RCX: 00007fd2b33c719d [ 748.579480] RDX: 0000000000000400 RSI: 0000000000f83a90 RDI: 0000000000000005 [ 748.586755] RBP: 0000000000f83a90 R08: 3220312020766f4e R09: 2035343a39353a31 [ 748.594030] R10: 656c6c616b7a7973 R11: 0000000000000293 R12: 0000000000000000 [ 748.601302] R13: 00007fd2b1968410 R14: 0000000000fba1e0 R15: 0000000000f83890 [ 748.608591] [ 748.610222] The buggy address belongs to the page: [ 748.615155] page:ffffea0007089c80 count:2 mapcount:0 mapping:ffff8801cdcb7658 index:0x427 [ 748.623478] flags: 0x2fffc000000203a(referenced|dirty|lru|active|private) [ 748.630412] raw: 02fffc000000203a ffffea000705fd48 ffffea0006e4c8c8 ffff8801cdcb7658 [ 748.638302] raw: 0000000000000427 ffff8801b5db79d8 00000002ffffffff ffff8801d9a52b80 [ 748.646189] page dumped because: kasan: bad access detected [ 748.651898] page->mem_cgroup:ffff8801d9a52b80 [ 748.656388] [ 748.658017] Memory state around the buggy address: [ 748.662948] ffff8801c23fff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 748.670319] ffff8801c23fff80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 748.677690] >ffff8801c2400000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 748.685046] ^ [ 748.688419] ffff8801c2400080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 748.695787] ffff8801c2400100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 748.703148] ================================================================== [ 748.710506] Disabling lock debugging due to kernel taint [ 748.718349] EXT4-fs warning (device sda1): ext4_expand_extra_isize_ea:2789: Unable to expand inode 16486. Delete some EAs or run e2fsck. [ 748.728156] EXT4-fs error (device sda1): ext4_expand_extra_isize_ea:2727: inode #16515: comm syz-executor4: corrupted in-inode xattr [ 748.744599] EXT4-fs warning (device sda1): ext4_expand_extra_isize_ea:2789: Unable to expand inode 16514. Delete some EAs or run e2fsck. [ 748.744714] Kernel panic - not syncing: panic_on_warn set ... [ 748.762913] CPU: 0 PID: 5578 Comm: rs:main Q:Reg Tainted: G B 4.19.0+ #92 [ 748.770016] EXT4-fs error (device sda1): ext4_expand_extra_isize_ea:2727: inode #17314: comm syz-executor5: corrupted in-inode xattr [ 748.771136] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 748.771142] Call Trace: [ 748.771164] dump_stack+0x244/0x39d [ 748.771184] ? dump_stack_print_info.cold.1+0x20/0x20 [ 748.783462] EXT4-fs error (device sda1): ext4_expand_extra_isize_ea:2727: inode #17327: comm syz-executor0: corrupted in-inode xattr [ 748.792579] panic+0x2ad/0x55c [ 748.792594] ? add_taint.cold.5+0x16/0x16 [ 748.792616] ? preempt_schedule+0x4d/0x60 [ 748.827854] ? ___preempt_schedule+0x16/0x18 [ 748.832269] ? trace_hardirqs_on+0xb4/0x310 [ 748.836601] kasan_end_report+0x47/0x4f [ 748.840580] kasan_report.cold.8+0x76/0x309 [ 748.844914] ? __ext4_expand_extra_isize+0x16f/0x240 [ 748.850030] check_memory_region+0x13e/0x1b0 [ 748.854442] memset+0x23/0x40 [ 748.857554] __ext4_expand_extra_isize+0x16f/0x240 [ 748.862495] ext4_mark_inode_dirty+0x8f9/0xb20 [ 748.867087] ? ext4_expand_extra_isize+0x5b0/0x5b0 [ 748.872023] ? __might_sleep+0x95/0x190 [ 748.876010] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 748.881555] ? ext4_journal_abort_handle.isra.5+0x260/0x260 [ 748.887274] ? __lock_is_held+0xb5/0x140 [ 748.891343] ? ext4_setattr+0x28f0/0x28f0 [ 748.895493] ext4_dirty_inode+0x97/0xc0 [ 748.899498] __mark_inode_dirty+0x7c3/0x1510 [ 748.903915] ? __inode_attach_wb+0x13f0/0x13f0 [ 748.908512] ? mark_buffer_dirty+0x1c6/0x8d0 [ 748.912924] ? __lock_is_held+0xb5/0x140 [ 748.916993] ? buffer_io_error+0xa0/0xa0 [ 748.921068] ? wait_for_stable_page+0x1a5/0x570 [ 748.925752] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 748.931291] ? unlock_page+0x2c2/0x4c0 [ 748.935187] ? wake_up_page_bit+0x6f0/0x6f0 [ 748.939520] ? __might_sleep+0x95/0x190 [ 748.943499] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 748.949068] ? __block_commit_write.isra.37+0x301/0x3f0 [ 748.954453] __generic_write_end+0x320/0x400 [ 748.958891] ? remove_inode_buffers+0x3f0/0x3f0 [ 748.963566] ? block_write_end+0xab/0x230 [ 748.967723] ? page_zero_new_buffers+0x8f0/0x8f0 [ 748.972486] ? __lock_is_held+0xb5/0x140 [ 748.976557] generic_write_end+0x6c/0x90 [ 748.980629] ext4_da_write_end+0x2e0/0xcd0 [ 748.984875] ? kasan_check_write+0x14/0x20 [ 748.989119] ? ext4_write_end+0x10c0/0x10c0 [ 748.993454] ? _copy_to_iter_mcsafe+0x15d0/0x15d0 [ 748.998302] ? __sanitizer_cov_trace_pc+0x4e/0x50 [ 749.003149] ? ktime_get_coarse_real_ts64+0x22e/0x370 [ 749.008340] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 749.013888] ? timespec64_trunc+0xea/0x180 [ 749.018125] ? inode_init_owner+0x340/0x340 [ 749.022454] ? drop_futex_key_refs.isra.14+0x6d/0xe0 [ 749.027560] ? ext4_write_end+0x10c0/0x10c0 [ 749.031889] generic_perform_write+0x4ca/0x6a0 [ 749.036485] ? add_page_wait_queue+0x400/0x400 [ 749.041080] ? current_time+0x1b0/0x1b0 [ 749.045066] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 749.050102] ? generic_write_checks+0x382/0x5d0 [ 749.054776] ? wait_on_page_locked_killable+0x520/0x520 [ 749.060147] ? ext4_file_write_iter+0x2a1/0x1420 [ 749.064915] __generic_file_write_iter+0x26e/0x630 [ 749.069860] ext4_file_write_iter+0x390/0x1420 [ 749.074450] ? ext4_file_mmap+0x410/0x410 [ 749.078607] ? ksys_dup3+0x680/0x680 [ 749.082333] ? zap_class+0x640/0x640 [ 749.086049] ? lock_downgrade+0x900/0x900 [ 749.090211] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 749.094977] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 749.100518] ? iov_iter_init+0xc2/0x1e0 [ 749.104498] __vfs_write+0x6b8/0x9f0 [ 749.108220] ? kernel_read+0x120/0x120 [ 749.112120] ? __lock_is_held+0xb5/0x140 [ 749.116193] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 749.121735] ? __sb_start_write+0x1b2/0x370 [ 749.126067] vfs_write+0x1fc/0x560 [ 749.129621] ksys_write+0x101/0x260 [ 749.133258] ? __ia32_sys_read+0xb0/0xb0 [ 749.137328] ? trace_hardirqs_off_caller+0x310/0x310 [ 749.142436] __x64_sys_write+0x73/0xb0 [ 749.146329] do_syscall_64+0x1b9/0x820 [ 749.150225] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 749.155636] ? syscall_return_slowpath+0x5e0/0x5e0 [ 749.160567] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 749.165416] ? trace_hardirqs_on_caller+0x310/0x310 [ 749.170444] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 749.175987] ? prepare_exit_to_usermode+0x291/0x3b0 [ 749.181009] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 749.185864] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 749.191054] RIP: 0033:0x7fd2b33c719d [ 749.194783] Code: d1 20 00 00 75 10 b8 01 00 00 00 0f 05 48 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 be fa ff ff 48 89 04 24 b8 01 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 07 fb ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 749.213696] RSP: 002b:00007fd2b1967f90 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 749.221407] RAX: ffffffffffffffda RBX: 0000000000000400 RCX: 00007fd2b33c719d [ 749.228916] RDX: 0000000000000400 RSI: 0000000000f83a90 RDI: 0000000000000005 [ 749.236190] RBP: 0000000000f83a90 R08: 3220312020766f4e R09: 2035343a39353a31 [ 749.243463] R10: 656c6c616b7a7973 R11: 0000000000000293 R12: 0000000000000000 [ 749.250739] R13: 00007fd2b1968410 R14: 0000000000fba1e0 R15: 0000000000f83890 [ 749.259035] Kernel Offset: disabled [ 749.262672] Rebooting in 86400 seconds..