parse_options(): Unrecognized mount option fsname. [ 1420.369775] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1420.384058] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1420.408942] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x900000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:02 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) pipe2(&(0x7f00000000c0), 0x84000) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0xff, 0x0, 0x0, 0x0, 0x4, 0x20180, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_config_ext={0x8001, 0x9}, 0x0, 0x0, 0x1, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000b63fe4)={0xa, 0x4e23, 0x80000005}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TUNSETVNETBE(r2, 0x400454de, &(0x7f0000000100)) [ 1420.423184] EXT4-fs (loop4): Invalid log cluster size: 1946157056 18:59:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = socket$inet6(0xa, 0x3, 0x11) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_int(r2, 0x29, 0x3c, &(0x7f0000000140)=0x63a5b074, 0x4) setsockopt$inet6_int(r2, 0x29, 0x3e, &(0x7f0000000080)=0x3, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x2, 0x0, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x80000001}, 0x10, r3, r4}, 0x78) r5 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r5) ioctl$sock_inet_SIOCSIFBRDADDR(r5, 0x891a, &(0x7f0000000200)={'wg2\x00', {0x2, 0x4e23, @empty}}) r6 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r6) getsockname(r6, &(0x7f00000002c0)=@pptp={0x18, 0x2, {0x0, @loopback}}, &(0x7f0000000180)=0x80) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000100)=r3, 0x4) sendmmsg(r2, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000000040)}}, {{0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000140)}}], 0x2, 0x0) recvfrom$inet6(r2, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1420.624003] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1420.658759] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:02 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6, @rand_addr, 0x8}, 0x1c) 18:59:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x5, &(0x7f00000005c0)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef4fa203", 0x3d, 0x400}, {&(0x7f0000000640)="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", 0x11b, 0x8001}, {&(0x7f0000000280)="14f596ef3f64a195a6fb914e5500d2236e8c65c4b0a691391c84920ec658079bac94be951932ab19b6c476fe5ff2dee93033b989d30dd73dbd830060ef1be15f13c48274eafc8c4bfa49a9dbaeb8dd60721d21abf6699a1ebe835eaa7518b3baa402143cb45d7082a1420f09651c0954816a2ef500b6020590e1975108fe98ba6e1becad4f6ce51a2224c4582ec2182e664c5f0d7db855538b921bb2491feb93e31512fe684fd965013996ce58169d2b0d", 0xb1, 0x100000000}, {&(0x7f0000000380)="24186e5a3074ed3d87d7d4d3cd7af40f5b308c984beb242d7bdbceaff13631ea31ba1ea640a14e74f9833508ed32a889346e592f42c544657f540d63c04c5a529ac7a14035b950022797b4f3fe157dd9c9183b86c22ebda554fdb53211678b9cddfbadcc163d5602b64ebdd6cd9debbecb489736f1659d3deb232a80413bdedcfb2d954c1307", 0x86, 0x20}, {&(0x7f0000000440)="ca9132d1444beb8d208e7b72246e93814750a874a44b1d3b25e23a7fac7f55e68b0a4371595a91654e88fb91217fd1f6cfbddf443e117b7e9bb1261f4d37e99bfcf9ec1f9cc480301a4293f0c4191c49ad86fa3d5e946743eeb1d6f9cc18437c39cb10aa53c34410d24a105d88feb89fe991c693361836d29ad16cbaff33986a17dca45637ca8560b9d0463f5df79c098f5dc1dd1fe2be401daa1f6c07345789e3f7fcc49ee8e76b35e059144f2f30fc94fe46fa8e112f708ad9d48c42285853b61efad68dc5327804de229668", 0xcd, 0x79252453}], 0x0, &(0x7f0000000200)=ANY=[]) 18:59:02 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) 18:59:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x1004000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:02 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="2275000048000000f3ff000000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0x3f00000000000000) [ 1420.853803] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1420.871591] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1420.882443] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x1f00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) [ 1420.908390] EXT4-fs (loop4): Invalid log cluster size: 1946157056 18:59:02 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x1e, @rand_addr, 0x40}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdirat$cgroup(r2, &(0x7f00000000c0)='syz0\x00', 0x1ff) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) 18:59:02 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_PCM_IOCTL_CHANNEL_INFO(r1, 0x80184132, &(0x7f00000000c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x100, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r2, 0x6, 0xc, &(0x7f0000000080)=0x4, 0x4) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$SOCK_DIAG_BY_FAMILY(r4, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x160}, 0x1, 0x0, 0x0, 0x14}, 0x800) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) [ 1421.017253] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1421.036952] EXT4-fs (loop4): Invalid log cluster size: 1946157056 18:59:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef4fa203", 0x3d, 0x400}], 0x0, &(0x7f0000000080)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) [ 1421.100888] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1421.115070] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x2000000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) [ 1421.221766] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1421.240948] EXT4-fs (loop4): Invalid log cluster size: 1946157056 [ 1421.315267] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1421.335621] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem 18:59:02 executing program 1: connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x86) setsockopt$inet6_int(r2, 0x29, 0xcf, &(0x7f0000000140)=0x3f, 0x17) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x3e, &(0x7f0000000040)=0x2, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x563, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) time(&(0x7f0000000080)) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TIOCVHANGUP(r4, 0x5437, 0x0) [ 1421.367545] EXT4-fs (loop4): Invalid log cluster size: 1946157056 [ 1421.386872] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000480)={0x3, @raw_data="d90c1f8b99970df335f2b9978c87018363a03d561126864d3e8ecd2fa3d0c8707cbbc520af028bf9dde24a58e3879272d3671503cda324a82240dea342b2882c6a2feb850fab04dcc87bf98687fade4fd3679f167c600e12015d6c7dc4552e9d2bd8b0ef5c2f3e2a318c3f5055c03afd4b6d5fdc405ff24eeab44edd4bc1ebd451c7f39f184c59d0454106131e5ab670b2a74229cdfb503e789bdc38121c9c2c21f86d3c29a0c4aba44389f2ebc9d91b3c1b97800eaa8f8907e390beb9efdf0476ed15a939e5cc85"}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000440)='batadv\x00') sendmsg$BATADV_CMD_TP_METER(r4, &(0x7f0000000180)={0x0, 0x7, &(0x7f0000000140)={&(0x7f0000000340)={0x30, r5, 0x7, 0x0, 0x0, {0x2, 0x3}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}]}, 0x30}}, 0x0) sendmsg$BATADV_CMD_GET_HARDIF(r3, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x54, r5, 0x4, 0x70bd27, 0x25dfdbff, {}, [@BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x592}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x2}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x7}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x4}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x6}]}, 0x54}, 0x1, 0x0, 0x0, 0x24044080}, 0x4004000) r6 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x6, 0x4902) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r6, 0xc008551c, &(0x7f00000002c0)=ANY=[@ANYBLOB="000400000c0000000400000009000000000004000000000000003d613a08965df0f75445c3d680b584a2197ca9b5a746f5eefbaad319856fa9f82919e2e4d862e0c4280d5e1c452fbb570f5714b720ca8f60a2dff2bc86124a733c8d24926ccb737b3cd58518d6c63ee58eab6c7142b1458db033b92ba7ed77"]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef4fa203", 0x83, 0x3fd}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="003edc616ee4d156aeb190d5dc994b92f564a348db4b092d53da06ba50b190163002aa"]) [ 1421.653034] EXT4-fs (loop4): unable to read superblock 18:59:03 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6, @rand_addr, 0x9}, 0x1c) 18:59:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x2200000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:03 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="2275000048000000f3ff000000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0x4000000000000000) 18:59:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef4fa203", 0x3d, 0x400}], 0x0, &(0x7f0000000080)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @private0}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000040)={r3}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x4e22, @rand_addr=0x64010102}}, 0x7, 0x1000, 0x3, 0xdb, 0x12, 0x5, 0x5}, 0x9c) 18:59:03 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x11) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000140)=0x63a5b074, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f0000000040)=0x3, 0x4) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0xf8802, 0x0) sendmsg$IPSET_CMD_GET_BYNAME(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x5c, 0xe, 0x6, 0x101, 0x0, 0x0, {0x7}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004000}, 0x841) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcsa\x00', 0x40c2, 0x0) ioctl$KVM_GET_DEVICE_ATTR(r2, 0x4018aee2, &(0x7f0000000340)={0x0, 0x619, 0x5, &(0x7f0000000300)=0x6}) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x563, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140)='devlink\x00') sendmsg$DEVLINK_CMD_GET(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="dd0700000000000000002e"], 0x30}}, 0x0) sendmsg$DEVLINK_CMD_PORT_GET(r1, &(0x7f0000000680)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000640)={&(0x7f0000000500)={0x120, r4, 0x400, 0x70bd26, 0x25dfdbfc, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x3}}}]}, 0x120}, 0x1, 0x0, 0x0, 0x20000010}, 0x8001) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$P9_RREADDIR(r6, &(0x7f0000000380)={0x103, 0x29, 0x1, {0x5, [{{0x8, 0x0, 0x2}, 0x7ff, 0x20, 0x7, './file0'}, {{0x40, 0x3, 0x8}, 0xe6a, 0xc7, 0x7, './file0'}, {{0x2, 0x0, 0x8}, 0x6, 0x5, 0x7, './file0'}, {{0x0, 0x3, 0x6}, 0x5, 0x6, 0x7, './file0'}, {{0x1, 0x1, 0x1}, 0x5, 0x3, 0x7, './file0'}, {{0x2, 0x2, 0x5}, 0x9, 0x51, 0x7, './file0'}, {{0x4, 0x2, 0x6}, 0x9, 0x1, 0x7, './file0'}, {{0x40, 0x3, 0x6}, 0xdd0f, 0x0, 0x7, './file0'}]}}, 0x103) [ 1421.836949] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1421.856779] EXT4-fs (loop3): Invalid log cluster size: 1946157056 [ 1421.928552] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1421.942640] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1421.948923] EXT4-fs (loop4): Invalid log cluster size: 1946157056 [ 1421.950287] EXT4-fs (loop3): Invalid log cluster size: 1946157056 [ 1421.970474] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. 18:59:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x2300000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) [ 1422.169215] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1422.184901] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x2c00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) [ 1422.326556] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1422.340623] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x2d00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) [ 1422.466307] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1422.492075] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x3f00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) [ 1422.692131] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1422.702965] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1422.711599] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:04 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="2275000048000000f3ff000000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0x8c5ba0c6eada2e11) 18:59:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x4000000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:04 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6, @rand_addr, 0xa}, 0x1c) [ 1422.756224] EXT4-fs (loop4): Invalid log cluster size: 1946157056 [ 1422.791372] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. 18:59:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef4fa203", 0x3d, 0x400}], 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00df2f43a84ca1c4b0c1f1d286cef10697e4f883d07a2793a76ad0"]) 18:59:04 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x11) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000140)=0x63a5b074, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f0000000040)=0x3, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000080)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x400000000000007f, 0xc2, 0x0, 0x0, 0x0, {[@exp_fastopen={0xfe, 0x8}, @mss={0x2, 0x4}, @sack_perm={0x4, 0x2}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}, @window={0x3, 0x3}, @sack={0x5, 0x6, [0x0]}, @mptcp=@mp_fclose={0x1e, 0xc}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) r3 = dup(r1) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r3, 0x28, 0x2, &(0x7f0000000100)=0x80000001, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = accept4$vsock_stream(r3, &(0x7f0000000080)={0x28, 0x0, 0x0, @local}, 0x10, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r4, 0x28, 0x2, &(0x7f00000000c0)=0x478, 0x8) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x563, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1422.959671] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1422.983719] EXT4-fs (loop3): Invalid log cluster size: 1946157056 [ 1423.020751] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1423.085113] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1423.100969] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1423.112411] EXT4-fs (loop4): Invalid log cluster size: 1946157056 [ 1423.120503] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x4800000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:04 executing program 4: r0 = inotify_init1(0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) setpgid(0x0, r2) fcntl$setown(r0, 0x8, r2) fcntl$getownex(r0, 0x10, &(0x7f0000000080)) r3 = inotify_init1(0x0) fcntl$setown(r3, 0x8, 0xffffffffffffffff) fcntl$getownex(r3, 0x10, &(0x7f0000000080)={0x0, 0x0}) setpgid(0x0, r4) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="25bca274769e0001b734fa0095200eda6e37d62ee0612687ecb86a548802a903000000000049d98b2607000000000000004f900300000000ef61501491b114506ee75419a6b2f3000000000000ecffff40ffb89546665ca10d922a7214ca0a36ff0000000000000000", 0x69, 0x400}], 0x0, &(0x7f0000000080)=ANY=[@ANYRESHEX=r4]) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r7, 0x84, 0x6e, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @private0}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x66, &(0x7f0000000040)={r8}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r6, 0x84, 0x10, &(0x7f0000000140)=@sack_info={r8, 0x859, 0x40}, 0xc) [ 1423.328850] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1423.341680] EXT4-fs (loop3): Invalid log cluster size: 1946157056 [ 1423.379379] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1423.398265] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1423.416011] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x4c00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) [ 1423.585965] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1423.603973] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:05 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="2275000048000000f3ff000000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0x8dffffff00000000) 18:59:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x6000000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) [ 1423.669587] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1423.695381] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:05 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6, @rand_addr, 0xe}, 0x1c) 18:59:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x6800000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) [ 1423.835336] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 18:59:05 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x11) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000140)=0x63a5b074, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f0000000040)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x563, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xfffffffffffffffd, 0xa000) [ 1423.920315] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1423.934294] EXT4-fs (loop3): Invalid log cluster size: 1946157056 [ 1424.012075] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem 18:59:05 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x11) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000140)=0x63a5b074, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f0000000040)=0x3, 0x4) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000080)=0x6, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x563, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KDSETLED(r3, 0x4b32, 0x7) r4 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) recvfrom$inet6(r4, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1424.058736] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x6c00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef4fa203", 0x3d, 0x400}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="d6"]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCL_SETVESABLANK(r1, 0x541c, &(0x7f00000000c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SCSI_IOCTL_GET_PCI(r3, 0x5387, &(0x7f0000000140)) ioctl$TIOCSRS485(r1, 0x542f, &(0x7f0000000100)={0x9, 0x5, 0x8}) 18:59:05 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) io_setup(0x40, &(0x7f0000000100)) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x0, &(0x7f0000000140)=0x8, 0x6) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETSF(r1, 0x4b4b, &(0x7f00000000c0)={0xfffffdfe, 0x0, 0x0, 0x0, 0x0, "b2e700"}) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) [ 1424.277731] EXT4-fs (loop4): Unrecognized mount option "Ö" or missing value [ 1424.291628] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1424.313695] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:06 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1c7cab1ad156fbb8, @perf_bp={0x0}, 0x8060}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)) fsetxattr$trusted_overlay_upper(r1, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f00000001c0)={0x0, 0xfb, 0xfd11, 0x1, 0x2, "bf16e0f16c38486378a7c1f96f4c2044", "663604014fa31d0d1adf9e637387341884cdf15942fe557334a935f6582413a10088cab5a2a96dd5ea0f4febfb7978c7b36333bd6836558f7fe0c3e5bcf2e8cf1ba2b3e7f16b0d2904ce6350cb1159f26b10e7c2ab08a47f745500bc04ae435a13b0c9e8e2554056592f5726e8070de5d0d5616c426f156cc719220a486309310ce4a799cd7eb93cd88405c5e2831e5f71c872a8c28a060c451b5354e4379fa9151848c4111d"}, 0xbb, 0x2) [ 1424.418296] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1424.433413] EXT4-fs (loop4): Unrecognized mount option "Ö" or missing value [ 1424.449796] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x7400000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_SIOCINQ(r2, 0x541b, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r5, 0x400c6615, &(0x7f0000000040)) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r6, @ANYBLOB="010000000082ad0000000000000000005700000000008e94d1d442c97be6bf7610b4c70eb126d25da5b21b77e6452ef8a19aa97067617e3171895bbe0909d5a5e6b0a7ded8edea539ea83c9b9091d97c19504aeadd9cb892cadbdec7278980cb98ed237548a9be16a4267b840ef5196188df93243e1670d17a0b69c38c02896e8e4324f149b7e2d3140e21dc4bc203fb99f4af8efabfd7be7aeec83573c74cc203904f153483832fd312dc3e2850b94ef4412a021fb22fb0a5309aa81e4e659a6a4e415b5705d2141ce0511c23164a257e99535e4498af9813"], 0x1c}}, 0x0) sendmsg$NL80211_CMD_GET_REG(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8040800}, 0xc, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="7400000016e8291ab38e705016a2a69f84a77c7d499585d9617486f5115ca16bff220e0d", @ANYRES16=r6, @ANYBLOB="110628bd7000fddbdf251f0000000600210061000000060021006200000034002280080002000700000008000600008000000800040003000000080004000200000008000600ffff000008000100000000000400cc00050092008100000005009200000000000700210061610000"], 0x74}, 0x1, 0x0, 0x0, 0x80}, 0x800) 18:59:06 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="2275000048000000f3ff000000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0x9749c71766c8c3fe) 18:59:06 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) munmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) writev(r2, &(0x7f0000000500)=[{&(0x7f0000000180)="7413aff5170a770c7c1e120bfe902b4e2fcdb21815df1fe9c362e8a6df62bc706e06ef456e4bcee026f32e413e7cc1d1c698b7bd854561c2b85b2640c8e1ad60663583407a63ba5b6e2b75225c6cee18f469780e65842e275b4617e63489e204a3314a57ba7251e797a37b3b4929a735", 0x70}, {&(0x7f0000000200)="cdd87dec2f6b12867e707e5fd27079fbc9389fb7", 0x14}, {&(0x7f0000000240)="675924d69aef347083a0e4c407dad9c55d19fc73316377a706cc8b99fb7b5d7e1b24ccce848ad115298c2fe4e36e88485c3e49fef8f74bbfed3108ffa386198dbac6b4259836e7acea16f9198f835bf83bb4680b04ba67004fce55726b1cc044e09db1334ec52bd5a77e7fd4dd641f2258cf3659237860eb4b32ef071e68e6ca4d3550e69198555469a444791fc25d1392450f173fc55048c18b2540ee70c1ed5ece193704d692889d4875cdb3", 0xad}, {&(0x7f0000000300)="f47f8f1f43c2104f84c00c6561063a6808cc51d5176b7620678d3949eb3ce83a159617c3ff57d67e700aa60986109cac8f38b6", 0x33}, {&(0x7f0000000340)="5de093864051d42365db88857ae132fdf8fcdfa4f0da3ca627dbc5a02e036dd6f0eb2855c2d6b73f9663a0f7e8b5bb79e130f567c25dc5476cf68e47011011ebadea5679dd13c9eec8807f007c5d1cb2f608002cd5cc2905f32e995e3635b2a8d9ba1b54687bd7b9633b81d1028f1b5b40bc67b34e1f11f1cb0f70697ea78e3f7af26fe895f2d25c33d646fd41465f", 0x8f}, {&(0x7f0000000400)="0ccf191ef62b4ffafa895d20ca2de388dbed04414574aeeb4671eaed63fbb412749a6efa766e67d33f6ab958985410307269c5e5e05e8f44633438c2ca3a5df5c235e6fc14e4b0bafa03937686ec15ef70a8a165e9ff640745610825458c7e25157e97b056685bfa46142643112f24899785e9c6f3497385526f9a73b0ca964d2501d10e31fa16931dc7023bb3f895afb964ea529df5014d1c8d82dc63d30b742ba2b97c32256b0c85fd64d6cdafe25a3f5aecf084218d84dcc2d0e314b51cf74210eb2efb619243bbc929249206560ad6d9", 0xd2}], 0x6) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) getsockopt$bt_hci(r0, 0x0, 0x1, &(0x7f00000000c0)=""/72, &(0x7f0000000140)=0x48) [ 1424.632987] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1424.652065] EXT4-fs (loop3): Invalid log cluster size: 1946157056 [ 1424.705234] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1424.720626] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:06 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6, @rand_addr, 0xfc}, 0x1c) 18:59:06 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$netrom(r1, &(0x7f00000000c0)={{0x3, @null, 0x6}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default]}, 0x48) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) accept4$bt_l2cap(r3, &(0x7f0000000140), &(0x7f0000000180)=0xe, 0x80000) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r4, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) 18:59:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x7586acb800000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) [ 1424.902577] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1424.912838] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:06 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x11) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000140)=0x63a5b074, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r2) sendmmsg(r1, &(0x7f0000001640)=[{{&(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e22, @broadcast}, 0x3, 0x2, 0x2, 0x1}}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000180)="ca78fc13dc181ec089d92578fc46ddb1cfdfa16e65988900b7a5f7fa72813b5c68c99234826bbd0163fd2c977fccbe686f7a8ae9048273c3cd9ccbb0ac4d46b77ad4a15f5695c6df21c0b1b3265397e508fdbd5cd0a44b41c304407f1e1851e06b5118ed7f68d6c2618a715a83c01e51406ce01cfd0f76508d83b1b3c6fedb0e34cd75efc87e0128e8000dfd53339ca647f6616982baf1742d7a37f9c8c351642afb5aab709d21f964cd0a64a5db637e0a0036f8f285", 0xb6}, {&(0x7f0000000100)="181895eff14b804d1f35a7a8e2179074ad41cbe5c3df210f", 0x18}, {&(0x7f00000002c0)="892b3f1c0eb3aacced979d18cbb9346133fee2839ff7f6668df8e981b6b0df94afe54c594fb10582697a63a7f890f3ba6dd6fb15084f4a8aa88b4ed8cf68944f517e531256c7f0fb547a", 0x4a}, {&(0x7f0000000340)="62fbd560f7fd60fa1095d00463afb86ba737f67779dd6e8297162687cc537bbc53aec61e14148322ec309af8c05878ae391d8391ef81120b7b0f8c5f9099b3688032ea5eb2dafad6974c77a3e7c7975604ca0b2027a8059b44779d2d7e908d553369a20742d1b80e7b17a6215e2becd3aa1162a3cbb91fe8559acb241708956018c74953", 0x84}, {&(0x7f0000000400)="ba27546742a43af779e3502f2e9018c0dc7dcaa4e7e443c7f9796a70f8a13fc0dd867ad2a7bba7aa3f0b60b3f2772f13a7ea9bb58c9f4ebf8d4c13845d9fa48a57af7a0504c0263c45053ed9214a907b935cc859db9e330871354262c40e0d756e4561af8c9b3d583b82e1f909490faaf1baf8c6f0ba8b839aabfac198452efadf945d", 0x83}, {&(0x7f00000004c0)="aabf64783e75b59f12db9285be6482f931742d3b8cb0f71641ad602f0d7fa6bd60b0e42830dea978528357787f565fb07623f1aa4cf99bafb00aeb31f40bd23c4269930aee9882e7b291a0cd92bff9de433061e8384d77dd280b02c7dbf769ece60007df1d6d257b059f55da2cc4f36816a6c075", 0x74}, {&(0x7f0000000540)}], 0x7, &(0x7f0000000600)=[{0x30, 0x10a, 0x6, "7498ed9e1a7188fba7727f9485a54992d0d0970453794a4ed74d64063584"}, {0x1010, 0x102, 0x3f, "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"}], 0x1040}}], 0x1, 0x40) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f0000000040)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x563, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:59:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$CHAR_RAW_ROGET(0xffffffffffffffff, 0x125e, &(0x7f00000002c0)) ioctl$DRM_IOCTL_MODE_GETPROPERTY(r1, 0xc04064aa, &(0x7f0000000100)={&(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000380)=[{}, {}, {}, {}, {}, {}, {}], 0x4, 0x0, [], 0x5, 0x7}) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef4fa203", 0x3d, 0x400}], 0x0, &(0x7f0000000080)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$vhost_msg(r3, &(0x7f0000000240)={0x1, {&(0x7f0000000140)=""/70, 0x46, &(0x7f00000001c0)=""/59, 0x1, 0x3}}, 0x48) 18:59:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x7a00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:06 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$SNDCTL_DSP_GETTRIGGER(r3, 0x80045010, &(0x7f0000000300)) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x80a282, 0x1bb) r5 = socket$nl_generic(0x10, 0x3, 0x10) munmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000440)='batadv\x00') sendmsg$BATADV_CMD_TP_METER(r5, &(0x7f0000000180)={0x0, 0x7, &(0x7f0000000140)={&(0x7f0000000340)={0x30, r6, 0x7, 0x0, 0x0, {0x2, 0x3}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}]}, 0x30}}, 0x0) sendmsg$OSF_MSG_ADD(r4, &(0x7f00000002c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000280)={&(0x7f0000000e40)=ANY=[@ANYBLOB="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"], 0x964}, 0x1, 0x0, 0x0, 0x9001}, 0x40000) sendmsg$BATADV_CMD_GET_GATEWAYS(r4, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1400}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x4c, r6, 0x400, 0x70bd28, 0x25dfdbfc, {}, [@BATADV_ATTR_ISOLATION_MARK={0x7, 0x2b, 0xffff}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xc4}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x5677d4a2}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x7}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40080}, 0x4080) [ 1425.076185] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1425.082261] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1425.089861] EXT4-fs (loop4): Invalid log cluster size: 1946157056 18:59:06 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x10, 0x3, 0x0) r4 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r4, 0x0, 0x8, &(0x7f0000000300)=ANY=[@ANYBLOB="d2"], 0x1) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @local}, &(0x7f0000000000)=0xc) sendmsg$nl_route_sched(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001c40)={&(0x7f00000002c0)=@newqdisc={0x3c, 0x24, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8, 0x8, 'tbf\x00'}, {0x10, 0x2, [@TCA_TBF_PRATE64={0x7}]}}]}, 0x3c}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'ip6gre0\x00', r5, 0x4, 0x8, 0x9f, 0x3, 0x0, @private2, @private1, 0x1, 0x1, 0x40000000, 0x3000000}}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) 18:59:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x7fffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) [ 1425.116376] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ocfs2_control\x00', 0x10200, 0x0) sendmsg$netlink(r2, &(0x7f00000004c0)={&(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000440)=[{&(0x7f0000000180)=ANY=[@ANYBLOB="980200002000000827bd7000fedbdf25880289809c9d1c1272d619aee1508aba7bf37ecb633e45ef6a784f3aeeb9a5ee5ce49e9e488b4a41fe7f59c19da3f4a5483bfe40aa31c8e58652b5eb491e32f06acfc99c141d73e91c388afcbab92cd660f3f5832c346542ef9a2d27b70726485cb3f1fc84a5b12ab670d31a5ad42b28171aa10909f52050189bb8048d861f07dc2c3500cb7205cfeff3819b6385f4ae278989f2adbbd1148033f4acab29c78742549ca05e3c2e38f1db018d203f0f491778fe076bcb5e9b786f719098fe31f5abd3f397e46f1e237c53715c144d110e3a7c5237ed58564c5ceef1456fc5855cfdd0306553ff221bfbcef2729a940c31b2cb927e022c670d8b50b6189cece9761a77fb30c56ee6ad7a8a8d4bcf8c2af876dd7260c5188503bb3b24502cc8e5d8dd2a8853c42f4868ccf1bbc95f15bfd724ab16529542a100c79a7d1d871e324b1a8d3f021d4f5c8676a248dffe1a9153d093242e09067c770ec7368ab62689cbc56c0a50eb615b8dcfd4074c54df498c31b9a6af10cff30c00760027272f2d7b2f2d000883f85c2df37e7daee83fed945e6a5168184752c744c6f2138c78c5ff945b71aa57317411c815940f959a5bad4c8a654d1de7e642acb29d4c31308896fb4bd884bb3430480d22c9e64e618d6537aad1f8c47ba250317d2d1b81f24853e51d3bc420320749d4343472582c45b5974c4fd5bfafd14f6a185ff6f42971609828e4e5a171ff5ae07fe976a8f043bd812b901e6b392992dca4980e47cbc8f6e3d5ebbd5a38380cc5bd18e85162831b4dd3585ddeb86f943d9e9ab7ad6642693eddeb56063189bab4561a65ceba2fe55a8ada1a007b2cb8a5eb9c6a32bbc924f40b29d4ad4cf84bcd3368026276e485018aede40f39dfd33576ec08006a00040000000000000000"], 0x298}], 0x1, &(0x7f0000000480)}, 0x4000) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x3f7, 0x4, 0x70bd29, 0x25dfdbfd, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_SET_GSI_ROUTING(r4, 0x4008ae6a, &(0x7f0000000500)={0x2, 0x0, [{0x4, 0x1, 0x0, 0x0, @adapter={0xb87, 0x6, 0x0, 0x5, 0x6}}, {0x9, 0xb037c19a65ab2fee, 0x0, 0x0, @sint={0x6, 0x8d5}}]}) [ 1425.260935] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1425.304593] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:07 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="2275000048000000f3ff000000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0xf0ffffff00000000) 18:59:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef4fa203", 0x3d, 0x400}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="b9da17329f5b4d6fc15f8ceb6a12eaf51c004053ca487c17647b17d8d998a7d158d89d08b6c6ed0af74051d765af0bbe3fced0d9175f9e233dd4ba0422b63c0e4a2c4242a90b81880d419c21cf76256aabafabb47c9c40f072dd30685567eeed3e5ed8c7194b04cb25e8cecfdde88cf59db1663f6fb4759df3ff5a391fc6915674dc783f20142929f9fa5242bebe1d08ba2652bfc7eb"]) dup(0xffffffffffffffff) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000080)={{0x6, @remote, 0x4e21, 0x2, 'rr\x00', 0x25, 0x2, 0x1f}, {@loopback, 0x4e23, 0x1, 0x4, 0xcd8, 0x8}}, 0x44) [ 1425.561624] EXT4-fs (loop4): Unrecognized mount option "¹Ú2Ÿ[MoÁ_Œëjêõ" or missing value [ 1425.599939] EXT4-fs (loop4): Unrecognized mount option "¹Ú2Ÿ[MoÁ_Œëjêõ" or missing value 18:59:07 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6, @rand_addr, 0x218}, 0x1c) 18:59:07 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x100000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_CHILD_SUBREAPER(0x25) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x17, &(0x7f0000000080)=0x3, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) getsockname$l2tp(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @initdev}, &(0x7f00000001c0)=0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) r2 = socket(0x10, 0x3, 0x0) r3 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r3, 0x0, 0x8, &(0x7f0000000300)=ANY=[@ANYBLOB="d2"], 0x1) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @local}, &(0x7f0000000000)=0xc) sendmsg$nl_route_sched(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001c40)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3c00000024000100000000000000000000000000ce2fccef59a0f0c21705f8a1e215b3602642fd3e87a330a68d876ae081a32465ca1d955497ae68e1d29b444c1604f2493d06210c001cecec7b8a63e66f823710160778cbe4b18177268987d4d5a114b3706f7af31096d059c5a3bd83b80147726f9d87", @ANYRES32=r4, @ANYBLOB="00000000f2ffffff000000000800080074626600100002000c0005000000000000000000", @ANYRESDEC], 0x3c}, 0x1, 0x0, 0x0, 0x4054}, 0x8000) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000180)={'syztnl2\x00', &(0x7f0000000340)={'ip6gre0\x00', r4, 0x2f, 0x5, 0xb4, 0x128, 0x4c, @empty, @remote, 0x7800, 0x48, 0xb8b, 0x9}}) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) 18:59:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x8000000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) [ 1425.744404] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1425.784175] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1425.828247] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1425.846220] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:07 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x11) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000140)=0x100, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f0000000040)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x563, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:59:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef4fa203", 0x3d, 0x400}], 0x0, &(0x7f0000000080)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) syz_mount_image$cifs(&(0x7f0000000140)='cifs\x00', &(0x7f0000000180)='./file1\x00', 0x646b, 0x6, &(0x7f0000000600)=[{&(0x7f0000000700)="efe385c17fac705446568f47fa7a960ce070bf6efdb3eb791e3d2e65f73582814cd9a4396b23afa3cc8f147d8b3ba4c2e1a7aded1c1939bea146350d751e7cfabb758c98780863e5b32baf6dc0f64263656a2aca63e5ed72757bd0a565b5e8c124d4f400eeda223598bfd02881e3e767ce99b7afca6db1495244a7b369326ec126ebd5bc186e4abd2a560dddd315d5cb4c004b70816bf1868185b81038cd509debb74bba458b5179579d726ab0c27d4cf758156a4d9258be9b1728b0a7504f870fc700086ac27a739fa2b68a0e80d536a140a1ae5cd765a73f325cc9fcd709a7c05376ae09d1f0b042d69ffe1fae7cd4b6f15b014798b1", 0xf7, 0x7f}, {&(0x7f00000001c0)="ef8cfd32a3ba7c2d52a37b8ce64ae21c2b89544d7271445c36e5d3dd9330", 0x1e, 0x8001}, {&(0x7f0000000380)="3a47443472be6bcc147514322a7cbc99c82bb289c1d1ab7393a7c4bbac0f4f1b5e1248f58ae2a453511c453084c43320b06b0cef832e0e0af68bc9e31a2c35eb28e85d12f17f6c4b7812d3b1b154bb8ee545", 0x52, 0x2}, {&(0x7f0000000400)="cf232ebb46e017244847b76efaf2669ce5114029e93ce53ec35786b0066377a7a3e6391bf58a0f7398407b4b3d419bfa0c8e7084ae4eb7388275d3f5c8054cb28cbd4c180c486355", 0x48, 0x11}, {&(0x7f0000000480)="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", 0xfe, 0x2}, {&(0x7f0000000580)="e02225533d21a50d4e2340ae8555e14b86d76c6d7368e0f15eaa79fb00249af649b9bd4141151972ca23631905a1f2fead096791159298c57a063a997a4e5466a0", 0x41, 0x4}], 0x109c400, &(0x7f00000006c0)='exp2\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clock_settime(0x6, &(0x7f0000000100)={0x77359400}) bind$netlink(r1, &(0x7f00000000c0)={0x10, 0x0, 0x25dfdbfc, 0x80000}, 0xc) 18:59:07 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/btrfs-control\x00', 0x10000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r0, 0xc0305302, &(0x7f0000000200)={0x5, 0x400, 0x2, 0x7fff, 0x10000, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_TRY_ENCODER_CMD(r2, 0xc028564e, &(0x7f0000000180)={0x1, 0x0, [0x9, 0xc73, 0xe2fd, 0xc, 0x81, 0x9, 0x800, 0x30]}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r3, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) r4 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x7fff, 0x101480) symlinkat(&(0x7f00000000c0)='./file0\x00', r4, &(0x7f0000000140)='./file0\x00') setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) 18:59:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x8cffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) [ 1425.994328] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1425.994375] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1426.018647] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x97ffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:07 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @private0}], 0x1c) dup(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@empty, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private1}, 0x0, @in6}}, &(0x7f0000000300)=0xe8) newfstatat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x6000) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="020000000100000000000000040000000000000008000000", @ANYRES32=r5, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r5, @ANYBLOB="1000060000001fcd20"], 0x34, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000180)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x4}, [{0x2, 0x1}, {0x2, 0xbf44707e51879415}, {0x2, 0x2, r2}], {0x4, 0x5}, [{0x8, 0x2, r3}, {0x8, 0x0, r5}], {0x10, 0x3}, {0x20, 0x2}}, 0x4c, 0x2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000040)={r6}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f00000000c0)={r6, @in6={{0xa, 0x4e23, 0x32a0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0xa96}}}, 0x84) [ 1426.062249] EXT4-fs (loop4): Invalid log cluster size: 1946157056 18:59:07 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x11) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000140)=0x63a5b074, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f0000000040)=0x3, 0x4) socket$inet6(0xa, 0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc, 0x0, 0xfffffeec}}, {{0x0, 0x563, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1426.154199] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1426.162191] EXT4-fs (loop4): Invalid log cluster size: 1946157056 [ 1426.197267] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1426.228163] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:07 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="2275000048000000f3ff000000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0xfec3c86617c74997) 18:59:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef4fa203", 0x3d, 0x400}], 0x0, &(0x7f0000000080)) [ 1426.405700] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities [ 1426.461457] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:59:08 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6, @rand_addr, 0x240}, 0x1c) 18:59:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0xc000000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:08 executing program 4: lstat(&(0x7f0000000100)='./file0/../file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000040)='./file0\x00', r0, 0x0) clock_settime(0x5, &(0x7f0000000140)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKBSZGET(r2, 0x80081270, &(0x7f0000000080)) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef4fa203", 0x3d, 0x400}], 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='fowner<', @ANYRESDEC=r0, @ANYBLOB="89f632b990b3352c7065726d69745f646972"]) [ 1426.689929] EXT4-fs (loop4): Unrecognized mount option "fowner<18446744073709551615‰ö2¹³5" or missing value [ 1426.691127] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1426.721151] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0xf5ffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef4fa203", 0x3d, 0x400}], 0x0, &(0x7f0000000080)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SIOCAX25ADDFWD(r1, 0x89ea, &(0x7f00000000c0)={@default, @default}) [ 1426.883589] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1426.891466] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1426.904591] EXT4-fs (loop4): Invalid log cluster size: 1946157056 [ 1426.919851] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:08 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x1, 0x0, @rand_addr=' \x01\x00', 0xfffffffc}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) r3 = inotify_init1(0x0) fcntl$setown(r3, 0x8, 0xffffffffffffffff) fcntl$getownex(r3, 0x10, &(0x7f0000000080)) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000100)=0x4) 18:59:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0xf6ffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) [ 1427.012508] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1427.037850] EXT4-fs (loop4): Invalid log cluster size: 1946157056 [ 1427.096851] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem 18:59:08 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x11) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e24, 0xfffffffe, @remote, 0x4}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000140)=0x63a5b074, 0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000440)='batadv\x00') sendmsg$BATADV_CMD_TP_METER(r1, &(0x7f0000000180)={0x0, 0x7, &(0x7f0000000140)={&(0x7f0000000340)={0x30, r2, 0x7, 0x0, 0x0, {0x2, 0x3}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}]}, 0x30}}, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r2, 0x100, 0x70bd25, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x2}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x2}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000080}, 0x4000084) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f0000000040)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x563, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1427.138115] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:08 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r3) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000100)={0xffffffffffffffff, 0x8, 0x2, 0xfe77}) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000140)=r4) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f00000000c0)=0x1) [ 1427.260537] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1427.277809] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0xfbffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:09 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="2275000048000000f3ff000000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0xffffffff00000000) [ 1427.481833] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1427.519324] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:09 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execveat(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)=[&(0x7f0000000100)='\x00', &(0x7f0000000140)='-!{\x00', &(0x7f0000000180)='nv\x00', &(0x7f00000001c0)='\x00', &(0x7f0000000200)='nv\x00'], &(0x7f0000000440)=[&(0x7f0000000280)='nv\x00', &(0x7f00000002c0)='}+%[\x00', &(0x7f0000000300)='/dev/bus/usb/00#/00#\x00', &(0x7f0000000340)='\x00', &(0x7f0000000380)=',\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00'], 0x1000) 18:59:09 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6, @rand_addr, 0x300}, 0x1c) 18:59:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0xfcfdffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f00000000c0), &(0x7f0000000100)=0x4) syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r1, 0x0, 0x486, &(0x7f0000000140), &(0x7f0000000180)=0xc) writev(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) [ 1427.778227] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1427.805231] EXT4-fs (loop3): Invalid log cluster size: 1946157056 [ 1427.886515] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1427.907757] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0xfdfdffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) [ 1428.054872] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1428.062664] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:09 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x11) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000140)=0x63a5b074, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f0000000040)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40)}}, {{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="aa9b281790cf9f8100082e2c4def69c148a5c2d98d4ada7f99b3699b523629996440d30775d00f6517176d93a8a282c70cebb3c8acc47e652b7d03776711288a565cca1d3a753f6885c460a45dd3f027abe32272bff3b3b601c6b56f982c7171bca49538b0", 0x65}, {&(0x7f0000000100)="1b3064a4fcbae331d464118f934d2290", 0x10}], 0x2, &(0x7f0000000140)}}], 0x2, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:59:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0xfdffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:09 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) openat$vicodec1(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video37\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg$sock(r0, &(0x7f0000002a80)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000100)="a70f51fee27ae517aa9d21541978afe1ca6a894928e79e26449175c3afdc0cfb093f3ae2f6b529bbd53d0db8666739351a1b851be632f0ed02e463d1eee4c872209a7374d38ab1e1df42a326055ef9510c16a8b3e934f62904b9c407acb6d6db347cfa1cc5e7b5b45ecf251b1cd267f5e2fda29587ec0644ae8da9196b75b98a6b2972a72446285dee29ffb70a5ec27cc2936c060a92a98f95b98836b24578c3bb25d9309a4e8665f0d962781d02e5ab7f25936cddf34d5c1e16581a07005cae807f285a", 0xc4}, {&(0x7f0000000200)="c3ce1c26155c96a581f4a16beb44c9c16051153446efea9e598da60494", 0x1d}, {&(0x7f0000000240)="27bb3d5a3ed3727ee756abc412228095a345260e637cad82c09d70ce6d487be505173ac066e97d4a4f22ec66fb21353bfb4418e112699d8237a5688f1f85453f2c4cef8e025318e23d2abfc83c187d", 0x4f}, {&(0x7f00000002c0)='0s', 0x2}, {&(0x7f0000000300)="c04abd4a68973cecd0b355638512f5b000540b1fa12cc4658f7c2c8b4fad0b9905d501e4afbcb0", 0x27}, {&(0x7f0000000340)="4d036452df748438605bce238bd748b5402152d729dd397fe56af86c5709cd83f25f2d758e3b03496836d2149f14f5936ae89b9eb09b51870b2571213ae0323f49215976f10c2db0632b620b72c5a9609d6daf15f4a35a8cf2e59c95fd5160abffdbe76cc0e6e03c7ffaf0e1ce798e3371379ffaf05c574f88f2de19db201bb2d7ceecfb81fd848390d7a2c9ce18b36c081425186af183f30606beed9f704ddaae8d41164feafd9cadcf6157be52d77365c69477d926a3881581c025e4238e457324844342ce5f92050e43d54c08ba1356df650c4c277fe7182653", 0xdb}, {&(0x7f0000000440)="122203f77183d50be6bc465abbcd653d62d045d3e818612075a8645c1e84a7aa7c3a194ddf6926ba7bd0408b2dd7a44e54e26cc3c6132feb6f8e789b3dc4d8b5931ef24ed9b83f6313549b6b86df9f48f7cf6856311b5a57ae23e3dcaba59f50f5d4d50d0ea1fca9ec5e9eb4d95a55300a36f80e28052dc7e7612d5e4827f3277a0830c288cbe85c993d8a957a248204950e39a9f452e17a714c66f1a11427f6d77d5d71efaa58b2d81ae3f4f9e8ac84afb16b5f059f40fac03fa86a083d17547da4456a8c431b509d03189a739ce1eccc6bf007a84916ab98", 0xd9}], 0x7, &(0x7f00000005c0)=[@txtime={{0x18, 0x1, 0x3d, 0x40000}}, @timestamping={{0x14, 0x1, 0x25, 0x7ff}}, @mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x6}}, @mark={{0x14, 0x1, 0x24, 0x5}}, @timestamping={{0x14, 0x1, 0x25, 0x5}}], 0x90}}, {{&(0x7f0000000680)=@llc={0x1a, 0x102, 0x4, 0x4, 0x7, 0x1, @multicast}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000740)=[@mark={{0x14, 0x1, 0x24, 0x7ff}}], 0x18}}, {{0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000780)="9794cb583fb9e2a5c152fb604806a8f22038cfaab21ce37ba0d1fbc51a2c11299a4e40d75542748a964f66d5c7e0ffaed09e0402c2cc70fc4c32ed6926cb5aacb9438508700a2fcd226025ba1a3a027fee424d708988f30c57395c61087ab10047bdfb82d4fe3bddba2a829ab2a921db", 0x70}, {&(0x7f0000000800)="01d22d5087876e661e838ee4c3d983380640281d8a4165f80fa045a939e43f541533c9dfc3f8d2c5d6f7ab6daa246b0a767a02c1b51b11f58080e675dd8fe8b52f71ed4197cc46d7736930f7e718780bb6f7ed890f87dd2f86cc4d65ce308a089b48250a585aaf46a3ec71b263b9c4dbd3716bea07388a76c9882b03be14dd52cad7e5", 0x83}, {&(0x7f00000008c0)="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", 0x1000}, {&(0x7f00000018c0)="9d80b669fa4bcd53be96ea1b7ada96cbbee6bb8313bfd7e0cf51da5236f79c9cbe963fc56e076f285f7cbef8f56f2414cd263263de6021691b4f487f59f83a3296a3c27f9786acbeb7239778a5ba7e80ae4285727b7024c493022cf0652bff995430668b582358abf139a0cd0dac6e5482baf9fa4702d93336705c03296c1047f6dfb7f4e0c15241c2149dc3f043455c89aa24184670b19e1fffdd29b2f881432c853d8d353eaa6d65fc7bbdcb0c51606134fa7d445625c54de4e7e73b7ddc83645014b1b64a43d736350f5c8a707bed83865548be5ea7f7af9b1153ed4d2cd705e4f5d853", 0xe5}, {&(0x7f00000019c0)="72c225a903dd252471b20f079284f0d6e0cb979e0f00503582effe2197f642190bb122df9f7fb42315bb28568c061917500d9d90cb1a13d25c6a03eb1db4ef78a22deb3f225dc378ce62584b0f7665ec3236cd633083631004c71bfcc08e746ea6e32eb25cd2b690fa", 0x69}], 0x5}}, {{0x0, 0x0, &(0x7f0000001c40)=[{&(0x7f0000001ac0)="631906e42ca8d5b1e93ac9fac3f5bb015f27cdda5c20a3c3b048ead963f72aef4f9d56237eae7e0167e5570ae6190824a7f7445925d744302a36fdb219383682ee5606365afb41467f288c3576a6e3226f5e2562b54e4417a6eee7f297c833d4c01371945d57e1b0cce8718d5f4c2bb1952948089beca2872cefe272acdd4e29989ee98d1256bb4717805ee8cd5caaf9c2faa42518c0139035de8517610d491af104f7c5c20a488b94b1afd083e1c6697954dccb72aeda5ba2ad1ccdc5e56bcee71e7fc86b36df6849e9ea7adf17", 0xce}, {&(0x7f0000001bc0)="8945ae70a8afab050afffd16da20f4e15664d21b2f5a443d373dc67b662b7fd62b7feea2694c248293347b1b9274b59f03d95e7523b85311b06e846f5cc44e644e3580bfc3749498a4bdddb99bd68a533a7a04d2f8bd6159f00e58e0d2208a6c", 0x60}], 0x2, &(0x7f0000001c80)=[@txtime={{0x18, 0x1, 0x3d, 0x4}}, @mark={{0x14, 0x1, 0x24, 0x6}}, @timestamping={{0x14, 0x1, 0x25, 0xfffffe00}}, @mark={{0x14, 0x1, 0x24, 0x3}}, @txtime={{0x18, 0x1, 0x3d, 0x5}}], 0x78}}, {{&(0x7f0000001d00)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-aes-neon\x00'}, 0x80, &(0x7f0000002100)=[{&(0x7f0000001d80)="08a69a6b76259c4e8a8eb5e799480c7a3f15f074250d61e17f40ccab636ac6e2b98f397f6122f12d7175ab349866e4e4c234ff1e103e3661d9d058b244f13c98a5597ffacaf9a023571d99034016736bba550b7baf166cc2c3d2146baabf8f2ef427a8a6134d603b18494f313eacb75ed21808bda203f77b0938e62462ee9e32a8d8870f7e1172dc33fc9d80b58ffbe252bb624492b607ff67af40", 0x9b}, {&(0x7f0000001e40)="4d3ed04a6b3c0c4a6dc98feff39fcf1480b4cb715eab8067c1e278dd2946ce0f3907fa8a8874145b01df009bd295d0fe9c8fdb91a91379b73e799c6295718bc4b23b1ece46be52c03a70c6cff5b3c613439608c4df772807a3a2d47107f004df5e114405c9945b08ab6afa54c68a652b52ff5ffe629ccb9ef377aaab317998e232e5dd3740e0c4c363845f2dbecd1348c2d0c9d2985e2659674b5349b9dc5ece6497fefb6b810c66446cbcd5129f326c7e720e4b3ca16a291e02d9a562b0a92ffe65038389df3cc28700201ab3c53892301c8e40535a3c3d9669d605ecd65e2e8e290bb067325540ed858e5ff32d3ce24c8700058280", 0xf6}, {&(0x7f0000001f40)="97f4f3102eb59314124460047d3597aecdc271f7cbe97ca61dc2b111d5b66027393b3dc94f417d314e79b1dc2c939fe78a4dafbd918fb7f9b3e61159fdd49da1b050a94b7e9bdbfd99a6b5b19df5cf1c1095ccbcd9afc30178b684fac5957d402813301c1a365948beb29a3995162ce10217f72a5a01b54de280a0c917f8aa3e2c2abdc85a2209e92fb9fad4ecef0518f749a36893d388f18ac6af57ca4cd159af1702ef0af5ad90f93bd155bdd216d0059cb35393b0", 0xb6}, {&(0x7f0000002000)="d0c4f259279235f05d9551032837078619a9b7b3c70677a9908f8cfcf8b6a93e7bf3f8aeec9da40741ecc61730fe75e9acc7c0b57c2d6a07df8239843c4213505d0acf77708ca2c656e612381e797bf2e07fff4d79719c0db58df7504429fecf684fdbb493a15a719fd6dda18a78ab9a456a582422179b3f838a6f08fbf8dc0467826e7e308a1bf0c233d41f802de9a28c6e21d70f477ad4aced29000e96be505408f94454fdce83c0d62088d0fc01d2c322c106100347cf1807cfec2eb60d142f1046b9fdd70e5ae0403df86a3bbc486d0815de73fa893ec8fd539859be99c4c0620e4da42e7fb55adf15f45785c40f590c6eaa8a86421f7f", 0xf9}], 0x4, &(0x7f0000002140)=[@txtime={{0x18, 0x1, 0x3d, 0x208a9fdb}}, @timestamping={{0x14, 0x1, 0x25, 0x9}}, @txtime={{0x18, 0x1, 0x3d, 0x9}}, @mark={{0x14, 0x1, 0x24, 0x1}}, @txtime={{0x18, 0x1, 0x3d, 0x7}}], 0x78}}, {{&(0x7f00000021c0)=@tipc=@name={0x1e, 0x2, 0x1, {{0x40, 0x4}}}, 0x80, &(0x7f0000002480)=[{&(0x7f0000002240)}, {&(0x7f0000002280)="d95ff2ce3ebc4526e70ee379bd50985e9852a0d9114cc88cdcdeb5f85e9c688644a49deb8a3d1c216976987475b2183ea17f428f0253f22f17761ba27a8c529c1534bb9539db98c59462b88172446f60ce368922e7b4ceb4c4be1d10a950b6601001cdb5eaa70eeef250c5de6ec8bc1cdf9322a902b058862fdc03ca91f4b8a10904761ac483d4f77766383d820de25611695f0586c50c3dd959e5615b099dd2cdb063eea35ac706e97c14aad9e8137bee7456573f797200041c", 0xba}, {&(0x7f0000002340)="8116b9c4b759fe7b9453d20427cbaf55509c27ec", 0x14}, {&(0x7f0000002380)="f534f6b15faaa678cf9ca1ffa40cc0f1dc69c9b050f8a00027ed0c7f42c018a9f061596835876ab2c8c6bd55dbadcfb56236cd86208eca003906240ab086f0eb0a101102f9fddfe91570a32c0fe4d69aa9d53f22b36e13a556f3ed6cae7cac230533f5cfe870ee4104043f14375728800af64ba01bb51a22e3665369cc13a9a442019b4d42c2cdc060f47ef49d114ada7ff28345245060e4669062ee7f8a7dbf9569a65c6864ecd293fcbf0d600992f212528c0c19d136746a68d25a2c82b0115f2edcf91a8f0277c00d7dea520945636c08348b6d6474d5248fddbc53fb99067b117b9e1530f6e957c71113898433a7ab4873b75401eb", 0xf7}], 0x4, &(0x7f00000024c0)=[@mark={{0x14, 0x1, 0x24, 0x9f7}}, @txtime={{0x18, 0x1, 0x3d, 0x401}}, @mark={{0x14, 0x1, 0x24, 0x1}}, @txtime={{0x18, 0x1, 0x3d, 0x1ff}}, @timestamping={{0x14, 0x1, 0x25, 0xa2c}}, @mark={{0x14, 0x1, 0x24, 0x3}}], 0x90}}, {{&(0x7f0000002580)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, 0x2, 0x4, 0x2}}, 0x80, &(0x7f0000002780)=[{&(0x7f0000002600)="4e8864352851fa0ed91ba5a28c729c5f98f4695889b369d3ed1894e1e27165bf65d30068c15aa5e0f9619eaff7c5156c5d8e491b418c0fde86eda54d6d389e4c726dc6caa97d94618d9f62a256cd286044a532498c8258c829fe347be2d29e9c14fc9f1a742a3518e440d99bbb36368348ef8e4f35530a0b0355f5df3e78426a7e45a92eb978d98a5762123c2e515a900cdc9b50aecb3adbb58f53dd", 0x9c}, {&(0x7f00000026c0)="1d9ae9c06a0246cdb490a75c1f5572d05182666d7cee847f4ee9aa8262837e96ab9772ee982b55f3b87c1ce78422caa1a06f38579d98bf5626ba4accf70279a3dcd9b6ee1e62ee63e140df779dc67423b28cbbf56e62be0a9ee84b67487cd368907caf134dea5df2b703f8a29b8152390815d6b5be1884b63c2cf9886c8bbf58b39d209e92fe8cda92bc4182d1bd80f536", 0x91}], 0x2, &(0x7f00000027c0)=[@timestamping={{0x14, 0x1, 0x25, 0x9}}, @txtime={{0x18, 0x1, 0x3d, 0x8}}, @txtime={{0x18, 0x1, 0x3d, 0x1000}}, @txtime={{0x18, 0x1, 0x3d, 0x3f}}, @mark={{0x14, 0x1, 0x24, 0xee23}}, @timestamping={{0x14, 0x1, 0x25, 0x80000001}}], 0x90}}, {{&(0x7f0000002880)=@nfc={0x27, 0x1, 0x2, 0x7}, 0x80, &(0x7f0000002a00)=[{&(0x7f0000002900)="fdcb750c05d9702be6eb8e2a9fc4065f2d1c092163a291cab33c156206022549649f5550b68e773b079920f22e1d71e9ef48426f155723d1ab909ef9ef3eb18749505df3060940d5d53cf80ab4b1649afe49cfaf3484baf6c0845a4a", 0x5c}, {&(0x7f0000002980)="1114316ff0cece6a8349186ba8bca8ce48ca89cacbe5a4ee00ee8f4afc8df758d66b95d221ecf12cc6198c2c0e387ebf453e3d73f3e934ecb6a68d2ce87f051d990550d7052458b3d4ccafa63f56d73767f4de077688c42ef7cf35132351db3758d9cb98d35116c49c9dc4640b59019b62c209550d896bdddd2e163c65d9cecb", 0x80}], 0x2, &(0x7f0000002a40)=[@timestamping={{0x14}}, @txtime={{0x18, 0x1, 0x3d, 0x1}}], 0x30}}], 0x8, 0x4008084) writev(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r3, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) [ 1428.206154] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1428.248078] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0xfeffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) [ 1428.429476] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1428.443217] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0xff0f000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:10 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6, @rand_addr, 0x500}, 0x1c) 18:59:10 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = inotify_init1(0x0) inotify_init() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r3 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r3, 0x0) r4 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x0) ftruncate(r3, 0x8200) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000044c0)=[{{&(0x7f0000001640)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, 0x0, 0x1c8}}], 0x1, 0x0) write$cgroup_type(r4, &(0x7f0000000200)='threaded\x00', 0x175d900f) sendmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) inotify_init() ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) [ 1428.593993] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1428.623150] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:10 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @private0}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={r2}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f00000000c0)={r2, 0xf4, "54e5b3128d0180613668e66519a36d767c33e175e0bd8838461d397ec2800f44279667caa03884d5c1c4a6f18492f7b06eb07a91f0aaff243dc39146ed2cb061cd58a0d0c591eff85988c961164fc1c1718130a50d686a709c401feee16f1b70b3cd0a25ecc2f34a28a9f0f6dbc9b07df683f81a460009b2a07c81f2e75a9cf150e7873d10734fcea93aa684d640cc4eb1d7c02032d6fc5c697d1a6854392317e1619739595ad776d9eb89cc9b881c6719740bb69bff9cd8a5dd13975fbd8510156c99531e4904d3feaab154b33a3f8e55926ee5941dca0522f78edd1af2ded66730afc7697e8ff9a6ab48864e57a6bdb566d54f"}, &(0x7f00000001c0)=0xfc) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f0000000200)={r3}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x20000d79}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r4, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) 18:59:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0xffff1f0000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) [ 1428.852596] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1428.863245] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0xffffff7f00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:10 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0xc40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) 18:59:10 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x11) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000140)=0x63a5b074, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f0000000040)=0x3, 0x4) setsockopt$inet6_tcp_buf(r0, 0x6, 0x1f, &(0x7f00000006c0)="8ffec34dbd893c525f04ad5897d378437c1e967f732c2cf1809390de19002f3cdce8f717bb3194f2c5e2e411f6a5174c4ced5224162b3bebc809ae175db07ab335cb8bffa7947d659605d0a0828b56db72da5dc38f9b10dde9b4b29dc6af90a5b8a1344e4a5187294fe1db506cc178e7beef93a37ee3ccd8af0f6ed5c598a17e5e35aab8e1169aca301973a9169961f3ce58e70e", 0x94) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$l2tp(r2, &(0x7f00000002c0)="eb618459d11a9c2235f856356b800bd0d8f381871bf46e0a31529ab20e5756f62d694b4d56ff5167b3c0b2a6c682bac3748e88717f1d39046082540075f502633cc621606e6dde1a6bf3335a8e053cb5ba7d5e7f1d37138c59cdeb8b2d7006b7b528958741466c8b01a64f5203bed709d39ff07bc26171496d3e467160cc0136531d5c61095f9ae3e16b499b53499ee307d85fa03cb37a4449a34ff6473f669c4f593b3bf926c0f4f767ffcda8473d785b29a6518f0b9f385cbc445a00b085ab260b326a6c80c019e443ff533e8b7a9ac9166db1bdea86c0608015e58c5818b1502112b615c869a63bfe761e5d90bf65920823da16b0201a", 0xf8, 0x4, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SNAPSHOT_ATOMIC_RESTORE(r4, 0x3304) sendmmsg(r0, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f0000002d40), 0x0, 0x0, 0xfffffdee}}, {{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)}, {&(0x7f0000000180)="ff6398d2110307a515f34f1b633d5d509bc3f3da63b9b34720ec5779620faec763ce76ae445e4ea6391d5b64f8d542f19026545cb7f3eb4662fd8f355804c80b57cf3120a740848d7cf92e9332e74eb99311e6f0f99d87b117133e9fe70e553bef197acb799cf6ce7ad89cc4b58197d48b0f2629af3cc7617c47934e621b9361ca918eaaafe9c71ffaaead9af0f59e2be8dd7ad83c56dce7d378e642dc5c266831483d6f9d0db23be1e3"}, {&(0x7f00000000c0)="a07cb161c4702493a545"}, {&(0x7f00000003c0)="61998806df82acf50552c9f2e4ba5c56662bd92e0a326b7bb6c292b70ef736c9d637200a8891f673afc41018f276c4fe302a309392b9814e1b8236966ae394e1eaf32cb2b1accb25dc0e09086eb76e8dd574f9d40c430252c8cf257262b02e97adcea266588446939c24aa85f67cca20373c298c3310f9dd8a8f656ea96b2d2e4bd622cc811ffc964db34936c03ad732429e74687db6d18421a3b9461936fde4f23625af13a9499d453389"}, {&(0x7f0000000500)="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"}], 0x0, &(0x7f0000000140)}}], 0x2, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:59:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000540)="25bca274769e620a2734fa0095e0612687ecb86a548802a90300000000000866620198b579a782d277146d0e0206e73ba8c63cd7dcc6760253ef4fa203", 0x3d, 0x400}], 0x0, &(0x7f0000000080)) prctl$PR_GET_ENDIAN(0x13, &(0x7f00000000c0)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x11, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100)='NLBL_CIPSOv4\x00') r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) futex(&(0x7f0000000300)=0x2, 0x0, 0x0, &(0x7f0000000380)={0x77359400}, &(0x7f00000003c0)=0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, &(0x7f0000000580)={@host}) setsockopt$inet_tcp_TLS_RX(r4, 0x6, 0x2, &(0x7f00000002c0)=@gcm_128={{0x303}, "dd1ed8bdaade81ab", "6ea76d0c0cbd6c332ef91ac4c093736c", "69277bb5", "2030cf3f567a52c6"}, 0x28) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1140}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r2, 0x8, 0x70bd2d, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x20000000) r7 = socket$inet_udplite(0x2, 0x2, 0x88) r8 = dup(r7) sendmsg$NLBL_CIPSOV4_C_REMOVE(r1, &(0x7f0000000280)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYBLOB="13af000050e03cef7ae370351ab556715db90000006b47b474bd86d66c16f18c6fb3293050dcbb80802e3ef2b8b050bbc3310b46593ece482d8908f5a1a8960200949ef9fdbd8f6a04f3565eed5f986335cbe0", @ANYRES64=r8, @ANYBLOB="02002bbd7000fddbdf250200000014000480050003000500000005000300070000005c000c8024000b80080009000e6b820008000900bfa4dd4b08000900a2c0e62d08000a00a7b80000348c5fa350000b8008000a0009f70000080009002645f16908000a00ff000000000000001c5c0000080009005c39222f080009008891e01508000100ffffffff"], 0x8c}, 0x1, 0x0, 0x0, 0x40880}, 0x811) [ 1429.063982] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1429.090685] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:10 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x80000000}, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x30000, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000140)=r2, 0x4) r3 = dup(r1) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cachefiles\x00', 0x8900, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r4, 0xc018620c, &(0x7f00000001c0)={0x2}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VHOST_SET_VRING_NUM(r3, 0x4008af10, &(0x7f00000000c0)={0x1, 0x3}) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) 18:59:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0xffffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:10 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) setpgid(0x0, r1) ptrace(0x420f, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/165, 0xa5) r2 = socket$inet_smc(0x2b, 0x1, 0x0) recvfrom(r2, &(0x7f00000000c0)=""/238, 0xee, 0x10000, &(0x7f00000001c0)=@l2tp={0x2, 0x0, @loopback, 0x3}, 0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) prctl$PR_GET_NAME(0x10, &(0x7f0000000340)=""/37) setsockopt$inet6_tcp_int(r3, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) [ 1429.225811] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1429.233324] EXT4-fs (loop4): Invalid log cluster size: 1711800320 [ 1429.291919] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1429.303840] EXT4-fs (loop4): Invalid log cluster size: 1711800320 18:59:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x2, &(0x7f0000000100)=[{&(0x7f0000000140)="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", 0x103, 0x400}, {&(0x7f00000000c0)="3a4c8038f72af44006c89c1a5d26edaa4d573608c1561533975e50dccf985323629d6d9320", 0x25, 0x9}], 0x0, &(0x7f0000000080)) r0 = open(&(0x7f0000000280)='./file1\x00', 0x94080, 0x40) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_PCM_IOCTL_TTSTAMP(r2, 0x40044103, &(0x7f0000000300)=0xfffffffe) setsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f00000002c0), 0x4) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TIOCMBIC(r4, 0x5417, &(0x7f0000000340)=0x1) [ 1429.336126] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1429.362252] EXT4-fs (loop3): Invalid log cluster size: 1946157056 [ 1429.457249] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1429.495634] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1429.505844] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:11 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6, @rand_addr, 0x600}, 0x1c) 18:59:11 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)={0x0, 0x0}) setpgid(0x0, r2) r3 = inotify_init1(0x0) fcntl$setown(r3, 0x8, 0xffffffffffffffff) fcntl$getownex(r3, 0x10, &(0x7f0000000080)={0x0, 0x0}) setpgid(0x0, r4) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x5c, 0x0, 0x20, 0x70bd25, 0x25dfdbfe, {}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_PID={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0xe0d, 0x2}}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x9, 0x4}}, @NL80211_ATTR_PID={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r2}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x4}, @NL80211_ATTR_PID={0x8, 0x52, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x200440c4}, 0x48041) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000000040)="2275000048000000f3ff000000000000", 0x10) r6 = accept4(r5, 0x0, 0x0, 0x0) splice(r0, 0x0, r6, 0x0, 0x30007, 0x0) r7 = socket$inet_udplite(0x2, 0x2, 0x88) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$KVM_ASSIGN_SET_MSIX_NR(r8, 0x4008ae73, &(0x7f0000000080)={0x1, 0x1}) 18:59:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0xffffffffffff0700, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) [ 1429.600907] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 18:59:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000100)="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", 0x13a, 0x400}], 0x0, &(0x7f0000000080)) [ 1429.700783] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1429.716461] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1429.737376] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:11 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001c40)={&(0x7f00000002c0)=@newqdisc={0x3c, 0x24, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8, 0x8, 'tbf\x00'}, {0x10, 0x2, [@TCA_TBF_PRATE64={0x7}]}}]}, 0x3c}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000180)={'ip_vti0\x00', &(0x7f0000000140)={'gre0\x00', 0x0, 0x8, 0x40, 0x4, 0x2, {{0x8, 0x4, 0x3, 0x7, 0x20, 0x67, 0x0, 0x1f, 0x2d, 0x0, @private=0xa010102, @rand_addr=0x64010101, {[@timestamp_prespec={0x44, 0xc, 0x82, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x80}]}]}}}}}) r2 = socket(0x10, 0x3, 0x0) r3 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r3, 0x0, 0x8, &(0x7f0000000300)=ANY=[@ANYBLOB="d2"], 0x1) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @local}, &(0x7f0000000000)=0xc) sendmsg$nl_route_sched(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001c40)={&(0x7f00000002c0)=@newqdisc={0x3c, 0x24, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8, 0x8, 'tbf\x00'}, {0x10, 0x2, [@TCA_TBF_PRATE64={0x7}]}}]}, 0x3c}}, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f00000001c0)={0x4c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfe, {}, [@GTPA_VERSION={0x8}, @GTPA_VERSION={0x8, 0x2, 0x1}, @GTPA_VERSION={0x8}, @GTPA_FLOW={0x6, 0x6, 0x4}, @GTPA_LINK={0x8, 0x1, r1}, @GTPA_O_TEI={0x8, 0x9, 0x4}, @GTPA_LINK={0x8, 0x1, r4}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8004}, 0x810) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) [ 1429.814834] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1429.832396] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1429.843409] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:11 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) socket$unix(0x1, 0x7807ca846e318e39, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000000c0)=0x6) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r4, 0x84, 0x21, &(0x7f0000000100), 0x4) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="11000000", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={r5}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000140)={r5, @in={{0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x84) 18:59:11 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x11) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000140)=0x63a5b074, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f0000000040)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x563, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$notify(r0, 0x402, 0x2) 18:59:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef4fa203", 0x3d, 0x402}], 0x0, &(0x7f0000000080)) 18:59:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0xffffffffffffff7f, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) [ 1430.108252] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1430.139980] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 18:59:11 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f00000004c0)=""/116) r3 = socket$netlink(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r3, 0x10e, 0x2, &(0x7f00000000c0)=0x12, 0x4) recvmmsg(r3, &(0x7f0000002340)=[{{&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @local}}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000380)=""/186, 0xba}, {&(0x7f0000000540)=""/224, 0xe0}, {&(0x7f0000000640)=""/106, 0x6a}], 0x3, &(0x7f00000006c0)=""/59, 0x3b}}, {{&(0x7f0000000700)=@nfc, 0x80, &(0x7f0000001ac0)=[{0x0}, {&(0x7f0000001780)=""/137, 0x89}, {&(0x7f0000001840)=""/52, 0x34}, {&(0x7f0000001880)=""/241, 0xf1}, {&(0x7f0000001980)=""/40, 0x28}, {&(0x7f00000019c0)=""/209, 0xd1}], 0x6, &(0x7f0000001b40)=""/240, 0xf0}, 0x2}, {{&(0x7f0000001c40)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000002000)=[{&(0x7f0000001cc0)=""/102, 0x66}, {&(0x7f0000001d40)=""/230, 0xe6}, {&(0x7f0000001e40)=""/51, 0x33}, {&(0x7f0000001e80)=""/93, 0x5d}, {&(0x7f0000001f00)=""/43, 0x2b}, {&(0x7f0000001f40)=""/42, 0x2a}, {&(0x7f0000001f80)=""/45, 0x2d}, {&(0x7f0000001fc0)=""/51, 0x33}], 0x8}, 0x994f}, {{&(0x7f0000002080)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000002240)=[{&(0x7f0000002100)=""/142, 0x8e}, {&(0x7f00000021c0)=""/52, 0x34}], 0x2, &(0x7f0000002280)=""/144, 0x90}, 0x800}], 0x4, 0x10002, 0x0) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0)='ethtool\x00') r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000440)={0x44, r4, 0x400, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x18, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x10, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}]}, 0x44}}, 0x0) sendmsg$ETHTOOL_MSG_WOL_GET(r3, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, r4, 0x0, 0x70bd29, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x4041}, 0x840) sendmsg$ETHTOOL_MSG_COALESCE_SET(r2, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r4, 0x300, 0x70bd26, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x24000801) 18:59:11 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x11) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000140)=0x63a5b074, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f0000000040)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x563, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x8100, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvfrom$inet6(r2, 0x0, 0x0, 0x40012002, 0x0, 0x0) [ 1430.166619] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:11 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x11) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000140)=0x63a5b074, 0x4) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsa\x00', 0x2f8881, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r1, 0x29, 0x36, &(0x7f00000000c0)={0x2b, 0x4, [], [@padn={0x1, 0x2, [0x0, 0x0]}, @calipso={0x7, 0x10, {0x1, 0x2, 0x8, 0x9, [0x7]}}, @jumbo={0xc2, 0x4, 0x3ff}, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}]}, 0x30) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f0000000040)=0x3, 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000180)={0x5, 0x1, 0x1, 'queue0\x00', 0xa0}) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x563, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000100)) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f00000002c0)={0x9, 0x0, [{0x1000, 0x1, 0x0, 0x0, @adapter={0x1, 0xe5, 0xfffffffffffffff8, 0x80000001, 0x3}}, {0x0, 0x2, 0x0, 0x0, @adapter={0x4d06, 0xfffffffffffffffb, 0x80000001, 0x5, 0x6}}, {0x8, 0x1, 0x0, 0x0, @msi={0x658, 0xeed, 0xfffffbff, 0x2}}, {0x2, 0x1, 0x0, 0x0, @irqchip={0x9, 0x5}}, {0x9, 0x2, 0x0, 0x0, @msi={0x9, 0x2, 0x4, 0x1000}}, {0x2, 0x1, 0x0, 0x0, @msi={0x8, 0x2}}, {0x1000, 0x3, 0x0, 0x0, @sint={0x1ff, 0x2}}, {0x7, 0x3, 0x0, 0x0, @msi={0x9, 0x3, 0x8, 0x400}}, {0x1ff, 0x1, 0x0, 0x0, @irqchip={0x7, 0x8001}}]}) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1430.261337] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1430.345642] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1430.353408] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:12 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6, @rand_addr, 0x700}, 0x1c) 18:59:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef4fa203", 0x3d, 0x400}], 0x0, &(0x7f0000000080)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) r2 = syz_open_dev$vcsu(&(0x7f0000000140)='/dev/vcsu#\x00', 0x1fc, 0x8800) write$midi(r2, &(0x7f0000000180)="2fc233212150e8c72a9f5d298cc64baffda964beff096015f182dc7afe39572d7bd3dadcbb4d1b588f009b8b67f1bc4fe0afc2103daecaea0f44f7c41226210b66e4c0f3e68c52859d30", 0x4a) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$TIPC_NODE_RECVQ_DEPTH(r1, 0x10f, 0x83, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 18:59:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:12 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000080)) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="2275000048000000f3ff000000000000", 0x10) r3 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r3) r4 = accept4(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x30007, 0x0) [ 1430.596806] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1430.634360] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1430.637222] EXT4-fs (loop4): Invalid log cluster size: 1946157056 [ 1430.658365] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) [ 1430.739114] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1430.747633] EXT4-fs (loop3): Invalid log cluster size: 1946157056 [ 1430.758049] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1430.767615] EXT4-fs (loop4): Invalid log cluster size: 1946157056 18:59:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) lstat(&(0x7f0000000100)='./file0/../file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000040)='./file0\x00', r2, 0x0) lstat(&(0x7f0000000100)='./file0/../file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000040)='./file0\x00', r3, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', &(0x7f00000001c0)='./file1\x00', 0x80000000, 0x3, &(0x7f0000001440)=[{&(0x7f0000000240)="48f7637c327d4e8a77adc57d5959c0201064f1247f7438ef4b6c240e1c42a48a8387926eca66599b122266ce123755a2495519ffac1feed2387ba32ff06a0addd9a11a1e450d51028d9f85cadd95e04fc464d3be1db981b3ee5b05396664a7ab1c3249e4d83d0ad026ceecfc6223718ce55e8e1e3949776a2ca90099e36dbdf322e0dfb52f53406248184c21c6864e1a0cabc1500f4ee786aedc77a9a2d4df5626506c939f59a0ccb6939528bff382428b74b46438bf45489db620f8353160ffcd260b4b53ea17fc21310d3ad0b933e5ca565a", 0xd3, 0xfffffffffffffff7}, {&(0x7f0000001380)="2e21ab10b05f6c1e1c96cdb2f819085c7f8d4e1cf23bc89558", 0x19, 0x6}, {&(0x7f00000013c0)="695375cd46167f24de692d284fa0c1d952a8b9b0d6520b5b2503787436d8e88f66f0e715d2e4ec5fd914a8c33a53d7443895929e88b37add12d1fdaa043227c832", 0x41, 0x1f}], 0x0, &(0x7f00000014c0)={[{@huge_always={'huge=always', 0x3d, 'ext2\x00'}}, {@uid={'uid', 0x3d, r2}}], [{@uid_eq={'uid', 0x3d, r3}}, {@smackfstransmute={'smackfstransmute', 0x3d, '.(-R:+'}}, {@permit_directio='permit_directio'}, {@obj_type={'obj_type'}}, {@hash='hash'}, {@euid_lt={'euid<'}}]}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(r5, 0xc01064bd, &(0x7f0000000100)={&(0x7f00000000c0)="d22ef71cd148af65707ccb2dd6d220b943", 0x11, 0x0}) ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(r1, 0xc01064bd, &(0x7f0000000140)={&(0x7f0000001580)="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", 0x105d, r6}) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef4fa203", 0x3d, 0x400}], 0x0, &(0x7f0000000080)) [ 1430.886493] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1430.919103] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) [ 1430.992511] tmpfs: Bad value 'always=ext2' for mount option 'huge' [ 1431.005986] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1431.013989] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:12 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x7, 0x1, 0x0, 0xff, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) [ 1431.102711] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1431.130618] EXT4-fs (loop4): Invalid log cluster size: 1946157056 18:59:12 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x11) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000140)=0x63a5b074, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f0000000040)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x563, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = accept4$tipc(r4, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10, 0x80000) r6 = socket(0x10, 0x3, 0x0) r7 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r7, 0x0, 0x8, &(0x7f0000000300)=ANY=[@ANYBLOB="d2"], 0x1) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @local}, &(0x7f0000000000)=0xc) sendmsg$nl_route_sched(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001c40)={&(0x7f00000002c0)=@newqdisc={0x3c, 0x24, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r8, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8, 0x8, 'tbf\x00'}, {0x10, 0x2, [@TCA_TBF_PRATE64={0x7}]}}]}, 0x3c}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000200)={'batadv0\x00', r8}) setsockopt$inet_MCAST_LEAVE_GROUP(r2, 0x0, 0x2d, &(0x7f0000000080)={0x9, {{0x2, 0x4e23, @remote}}}, 0x88) 18:59:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef4fa203", 0x3d, 0x400}], 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00a276f2bcaafd900a9dc84df5fe6ca7c15b7bb8d4cdc5d377fae9bc9391e5b786a1b09b7537aa9cac6fa8"]) [ 1431.242242] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1431.279973] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:12 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x11) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) recvmsg(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, &(0x7f0000001400)=[{&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f0000000180)=""/189, 0xbd}, {&(0x7f00000012c0)=""/207, 0xcf}, {&(0x7f0000000100)=""/49, 0x31}, {&(0x7f00000013c0)=""/24, 0x18}], 0x5, &(0x7f0000001480)=""/207, 0xcf}, 0x100) setsockopt$inet6_int(r1, 0x29, 0x42, &(0x7f0000000140)=0x63a5b074, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f0000000040)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x563, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:59:12 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) perf_event_open(&(0x7f00000000c0)={0x4, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) r1 = socket(0x10, 0x3, 0x0) r2 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r2, 0x0, 0x8, &(0x7f0000000300)=ANY=[@ANYBLOB="d2"], 0x1) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @local}, &(0x7f0000000000)=0xc) sendmsg$nl_route_sched(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001c40)={&(0x7f00000002c0)=ANY=[@ANYBLOB="3c00000024000100"/20, @ANYRES32=r3, @ANYBLOB="00000000feffffff0d000000080008007462660000000000000000040000000000000000"], 0x3c}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f00000002c0)={'ip6_vti0\x00', &(0x7f0000000240)={'syztnl2\x00', r3, 0x4, 0x6, 0xad, 0x80, 0x1, @mcast1, @loopback, 0x10, 0x7, 0x2, 0x10001}}) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000380)={'syztnl0\x00', &(0x7f0000000300)={'ip6tnl0\x00', r4, 0x4, 0x1, 0x7, 0xffffe000, 0x3c, @loopback, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1, 0x8, 0x4, 0x9}}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) r7 = dup3(0xffffffffffffffff, r5, 0x80000) ioctl$SIOCAX25GETINFO(r7, 0x89ed, &(0x7f0000000140)) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6, @rand_addr=' \x01\x00'}, 0x1c) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f00000001c0)=0xffffffffffffffff, 0x4) [ 1431.311812] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1431.372371] EXT4-fs (loop4): Invalid log cluster size: 1946157056 [ 1431.433444] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1431.460085] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1431.468113] EXT4-fs (loop4): Invalid log cluster size: 1946157056 18:59:13 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6, @rand_addr, 0x900}, 0x1c) 18:59:13 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:13 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) execve(&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)='!\'\x00', &(0x7f00000001c0)='ctr(cast6)\x00', &(0x7f0000000200)='ctr(cast6)\x00', &(0x7f0000000240)='ctr(cast6)\x00', &(0x7f0000000280)='*^)^+(^:\x00'], &(0x7f0000000400)=[&(0x7f0000000300)=')\'-.\x00', &(0x7f0000000340)='skcipher\x00', &(0x7f0000000380)='skcipher\x00', &(0x7f00000003c0)='ctr(cast6)\x00']) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, &(0x7f00000000c0)=0x3, r0, &(0x7f0000000100)=0xfa5, 0x1, 0x2) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bind$alg(r4, &(0x7f0000000940)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast6)\x00'}, 0x58) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0xff, 0x0, 0x0, 0x41c1, 0x1401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xe}, 0xa, 0x200000, 0x0, 0x0, 0x10, 0x20004, 0xcb}, 0x0, 0xffffffffffffffff, r0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="2275000048000000f3ff000000000000", 0x10) r7 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r7, 0x0, 0x30007, 0x0) 18:59:13 executing program 4: r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f00000011c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000380)="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", 0x4e2, r1) r2 = request_key(&(0x7f0000000140)='cifs.spnego\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='ext2\x00', 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, r0, r1, r2, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file1\x00', 0x7, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef4fa203", 0x3d, 0x400}], 0x0, &(0x7f0000000240)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f00000011c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000380)="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", 0x4e2, r3) keyctl$setperm(0x5, r3, 0x1000001) socketpair(0xb, 0x4, 0x20, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_inet6_tcp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000280)) 18:59:13 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0)={0x2, 0x4}, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000000140)={&(0x7f0000000100)=[0xdcc8, 0x8, 0xa12], 0x3, 0x200, 0x0, 0xff, 0x7, 0x400, 0x81, {0x5, 0x6, 0x8, 0x18, 0x7, 0xfffe, 0x7, 0x3, 0x7f, 0x5, 0xfc00, 0x81, 0xffffff81, 0x0, "dbadaf2296243d597b099545c9701f3890f5659cce526e763201e5cc11a49db4"}}) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) [ 1431.654834] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1431.671502] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:13 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz1\x00', 0x1ff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) [ 1431.732083] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities [ 1431.737842] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1431.768016] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:13 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:13 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x10000, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) 18:59:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef4fa203", 0x3d, 0x400}], 0x0, &(0x7f0000000080)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r3, 0x0, 0x8, &(0x7f0000000300)=ANY=[@ANYBLOB="d2"], 0x1) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @local}, &(0x7f0000000000)=0xc) sendmsg$nl_route_sched(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001c40)={&(0x7f00000002c0)=@newqdisc={0x3c, 0x24, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8, 0x8, 'tbf\x00'}, {0x10, 0x2, [@TCA_TBF_PRATE64={0x7}]}}]}, 0x3c}}, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000000c0)={@local, @empty, r4}, 0xc) [ 1431.962368] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1431.994228] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 18:59:13 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r1) ioctl$FIBMAP(r1, 0x1, &(0x7f00000000c0)=0x10001) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) [ 1432.008409] EXT4-fs (loop3): Invalid log cluster size: 1946157056 [ 1432.031385] EXT4-fs (loop4): Invalid log cluster size: 1946157056 [ 1432.101909] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1432.110209] EXT4-fs (loop3): Invalid log cluster size: 1946157056 [ 1432.113322] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1432.124732] EXT4-fs (loop4): Invalid log cluster size: 1946157056 18:59:13 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_tcp_int(r2, 0x6, 0x11, &(0x7f00000000c0)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) 18:59:13 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) [ 1432.355901] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1432.363517] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SIOCX25SDTEFACILITIES(r1, 0x89eb, &(0x7f0000000080)={0x3, 0x101, 0xf285, 0x5, 0x9, 0x9, 0xa, "4a18312e00bc0e56168d583d3df22063a2d9ddc4", "c927ce4008e50f340a9289317e03cd23f9ba6320"}) r2 = socket$inet6(0xa, 0x3, 0x11) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_int(r2, 0x29, 0x3c, &(0x7f0000000140)=0x63a5b074, 0x4) setsockopt$inet6_int(r2, 0x29, 0x3e, &(0x7f0000000040)=0x3, 0x4) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$kcm(0x10, 0x2, 0x10) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000006c0)={0x34, r6, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x20, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}]}]}, 0x34}}, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(r4, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, r6, 0x100, 0x70bd2a, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x4804) sendmmsg(r2, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x563, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvfrom$inet6(r2, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$RDMA_NLDEV_CMD_DELLINK(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x18, 0x1404, 0x8, 0x70bd2d, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}]}, 0x18}}, 0x80) 18:59:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef4fa203", 0x3d, 0x400}], 0x0, &(0x7f00000000c0)={[{@nojournal_checksum='nojournal_checksum'}, {@max_batch_time={'max_batch_time', 0x3d, 0xf6}}, {@noquota='noquota'}, {@commit={'commit', 0x3d, 0x6}}]}) 18:59:14 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6, @rand_addr, 0xa00}, 0x1c) 18:59:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0xf, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:14 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x210000, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fstatfs(r2, &(0x7f00000000c0)=""/66) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f0000000140)=0x3, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) 18:59:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0205649, &(0x7f0000000180)={0x9a0000, 0x4, 0x1, r3, 0x0, &(0x7f0000000140)={0x9c090a, 0x1af1, [], @p_u32=&(0x7f00000002c0)=0x4edc}}) ioctl$FS_IOC_SETFSLABEL(r4, 0x41009432, &(0x7f00000001c0)="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") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS32(0xffffffffffffffff, 0xc0245720, &(0x7f00000006c0)) write$binfmt_misc(r6, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r7 = socket$alg(0x26, 0x5, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000300)={0xa, 0x4e23, 0x8, @dev={0xfe, 0x80, [], 0x1a}, 0x100}, 0x1c, &(0x7f0000000440)=[{&(0x7f0000000340)="c8d2799cffe4960d23d3bd3f9274a06e404cfeb63cff9e577c2348419909bbaa1769e604fd26849ee9a741cdc7a1f8f7b741044a24fcf037591b4dc9c566ac80630baca2d1b931967cee6e30743e9f20edf82e2771d5e63bec3592672007d27aac0e633b093f806cddd41e9af1857108f3f3104903f70c89e1f2e636eaaea23e927c397e14d84ab6f0b7e7e4c248b8033e527de869bf0adf07c281801566c4dc51813156f1a94d799f4134705570a57e24ca7bf91a66a03152cc54ad6600123b2d9a79ea7fe94725a59780e2bf417aee0d2a81b222", 0xd5}], 0x1, &(0x7f0000000480)=[@rthdr_2292={{0xa8, 0x29, 0x39, {0x5c, 0x12, 0x1, 0x9, 0x0, [@mcast2, @private0={0xfc, 0x0, [], 0x1}, @private1={0xfc, 0x1, [], 0x1}, @mcast2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @private2, @local, @remote, @private2={0xfc, 0x2, [], 0x8}]}}}, @rthdr={{0x68, 0x29, 0x39, {0x84, 0xa, 0x2, 0x3, 0x0, [@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @local, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @private0={0xfc, 0x0, [], 0x1}]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x5}}, @rthdrdstopts={{0x20, 0x29, 0x37, {0x2, 0x0, [], [@enc_lim={0x4, 0x1, 0x3}]}}}, @dstopts_2292={{0x38, 0x29, 0x4, {0x12, 0x3, [], [@pad1, @pad1, @ra={0x5, 0x2, 0xc8}, @ra={0x5, 0x2, 0x1}, @jumbo={0xc2, 0x4, 0x2}, @jumbo={0xc2, 0x4, 0x7fff}]}}}, @flowinfo={{0x14, 0x29, 0xb, 0x3ff}}], 0x198}, 0x40014) bind$alg(r7, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r7, 0x117, 0x1, &(0x7f0000000040)="2275000048000000f3ff000000000000", 0x10) r8 = accept4(r7, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r8, 0x29, 0x2a, &(0x7f0000000080)={0xc4f4, {{0xa, 0x4e21, 0x81, @mcast1, 0x9}}}, 0x88) splice(r5, 0x0, r8, 0x0, 0x30007, 0x0) [ 1432.584666] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1432.600632] EXT4-fs (loop4): Mount option "nojournal_checksum" incompatible with ext2 [ 1432.602519] EXT4-fs (loop3): Invalid log block size: 135266304 18:59:14 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f00000011c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000380)="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", 0x4e2, r2) keyctl$read(0xb, r2, &(0x7f0000000200)=""/13, 0xd) setsockopt$inet_tcp_buf(r1, 0x6, 0x1c, &(0x7f00000000c0)="61bc9c2db5257062a185fedf82d0c7605c4cf102068b8e65a39bf30f5e95f9362db37c6a0033069478486149ba38b0ca64", 0x31) perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffad, 0x1, 0x8, 0x1, 0x0, 0x0, 0x41c1, 0x85055, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x2}, 0x200}, 0x0, 0x6, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r3, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000280)=r5) sendto$inet6(r4, &(0x7f0000000100)="091df7851fd5df8477185fee93e80531b835ecdd11df6a4702770c89afbeb8303e7facfe52acd2fa4af38d03bb350fdb667d01b2506775eaea4c47f984d4bdd63815f1e3a49fab495150a7b357d68f443c9f0bbea1554cf0e1d74da6b87eb8b1babbb5cd34d01c71a4e99674d49756303b3ac0096e3e4934f3c68f7948eeaa7c1e9203b5d9b5676260ba4e3d570f93f174c42e5b7094ff25ca508cadd63cf75f0f14b5d77b35ea10", 0xa8, 0x4044080, &(0x7f00000001c0)={0xa, 0x4e20, 0x5, @loopback, 0x8}, 0x1c) 18:59:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) [ 1432.698563] EXT4-fs (loop4): Mount option "nojournal_checksum" incompatible with ext2 18:59:14 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x200140, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000001c0)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, r1, 0x400, 0x70bd2b, 0x25dfdbfc, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x20}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0xc0}, 0x80) writev(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) r3 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x9) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) [ 1432.795182] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 18:59:14 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x21489, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VIDIOC_CREATE_BUFS(r4, 0xc100565c, &(0x7f00000002c0)={0x6, 0xff, 0x1, {0xb, @win={{0x0, 0x2, 0xa7, 0x8}, 0x4, 0x2, &(0x7f00000001c0)={{0xfffff801, 0x80000001, 0x308b, 0x3}, &(0x7f0000000180)={{0x1, 0x2, 0x5, 0x1}, &(0x7f0000000140)={{0x8, 0x1, 0x400, 0x223}}}}, 0x80, &(0x7f0000000200)="fd4aef247bbd32c6f3bf15e9df5038ac49cc0a6d093ecc97ecd26fa509c5e43fc0007f0d87a65cc5f0d75f055817f99766ca132a9836be54dd19b65a72bf92e94538f8b38ed92b3b63088ebf10afac90b7e08ffb951267127d46480860d7d594bdae4d276a0181282e7522f73578b9fdecbe3321d4cd179ba421dca4a54a4d0e831947cdefbe2e2c892e9802b7fb57e1d8535135e05756d014c4b23d86a88ee65824"}}, 0x10001}) ioctl$PPPIOCNEWUNIT(r2, 0xc004743e, &(0x7f00000000c0)) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x242, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) [ 1432.875695] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 18:59:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x14, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x2aa000, 0x0) ioctl$KVM_GET_SREGS(r4, 0x8138ae83, &(0x7f0000000780)) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000580)={0x7, 0x21d, 0x81}, 0xc) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000a40)=ANY=[@ANYBLOB="5c00000046e7c61ddaf8389f7fe9353c81698ad9847a28c98bb18173de02384aabde9ac3c81270573a917f99a70813c38232d299c51cc8711c8ea8f04662302c5f79ed710cb478c0f2d22b21cb47aa29251304823dbd82e63c171445e88cbea0dff04ee7e9dd03ad973008fd8d", @ANYRES16=r7, @ANYBLOB="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"], 0x5c}}, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r1, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="000825bd7000fddbdf250700000008000900020000000c001600c30100000000000014000800726f73653000000000000000000000000500050001000000050005000000000008001700", @ANYRES32=r3, @ANYBLOB="05000500010000000500120100000000"], 0x64}, 0x1, 0x0, 0x0, 0x48080}, 0x85) r8 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) getsockopt$ax25_int(r8, 0x101, 0x9, &(0x7f0000000240), &(0x7f0000000280)=0x4) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef4fa203", 0x3d, 0x400}], 0x0, &(0x7f0000000080)) mount$overlay(0x0, &(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)='overlay\x00', 0x1800000, &(0x7f0000000500)={[{@metacopy_off='metacopy=off'}, {@nfs_export_on='nfs_export=on'}, {@xino_auto='xino=auto'}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, '^'}}, {@seclabel='seclabel'}, {@permit_directio='permit_directio'}]}) syz_mount_image$bfs(&(0x7f00000005c0)='bfs\x00', &(0x7f0000000600)='./file1/file0\x00', 0x80000001, 0x4, &(0x7f0000000700)=[{&(0x7f0000001200)="b1a165ace2fa8a5f6b318807a3017617ae001a973af3709664b07e410dd98d64a6818363f864b21dddfe816dea4aa40fc522cd8b593385548edfb4440172aef38584cb545ce189ad265ca04c4120bf29aaa803ca029a8140873eb520d2a2732b8acd3e8330bfbaa838a59250c74c38765f37a1749ff11c51f75109dc3b4f4753e1c11a049e016a1b742ecbbd9ac7943e6638300a672c9322cb424b6bff0fa805101bd6f1b8bcd9923058759f25e3198285e66e11937f27bf6ae65b2f60f117eb5f2b712c1a4019c1a01d4787f3bae5c1eff0b2e04be6c5264930a6f1ef967b7cfaed75ccdcb0a762b8ddbb9cddd03a50d9e30f5b6f82c35eb498ceb4da534f9306acd5405d66ce73d78d9bc2ee448b94f5325bac1f1fd3a6129acc3d6584e0a11adc434bbdb61523eb27954c57989bb91ce5fbc122e4675d042cb3025d718403c9a4a829e55a106b1be0ecc73688353e43d00b2648032b9a620a5a7c88c7a5e778d2c4ea13affee81636695be3419482db4825ea5d179202aff540a6590bef9a75fd94c90d5118f6d7348da116ff325cc35dc3555b77613c15c431ca4321471d0e2aba878d7ec67a9dbc1d7634a6e4cfe2c38bebadd824d30c5484aa3e8dbcc58989fed6df38edae363cb8cc92c50d34bc44ab852798847d39ce9655fd1efc36161547fafac4d48da35c9c82ed201f6a96249fc4a4216f8a6ba6e2e28d8ac7b561e5aea740868a998c9888954b2df039ab274745d3304355e104b49a3fbfd7a1232a418fa8b41963b42e1d1f39e9715a56b828cfd7db1ab7bff2c06c7e22e752ec1a187ddbd0194cb3d9378faef714860348152a44ec3d16e7231c35b9251ee7e0a87cee21d36297ccea12fd7dffdf54e79369ffdd844562999477773570a53a045fab1e4f0f34700130622bf1fd1bb4bc4388eefd93a5a7d58c798e13c5f3b7e08fb21f36e5248898b51173ea034bf1c612f4bd210fbe4eb953ddef19a8d16f9c2047bcaa68815c799ea44cf776041cfc2afe9dc7fc89e4004018f41bda18eff5d749498691b3f9ac058c311c925d636e471faf278de7a0d0eec79c92962530866c1657817eb4a0e3e04508c6a70c4c9bcff642266846f47fe7c8e986621850651d546285ecf2e372298ca7552480c791d50a8d756eda63935b1f0cb6b4666c48cc84047f7e3ed2957a8f9e3cb972c035fb7587009e2fcee5828d12e2fd8a1b32d8887390125f14a382e50a7a45b913193b549c0ef47a7532982877815da1f9302bdf27b5f2a8318a2fe1cf0fd12ac120ff20ce02b66d399cb432bf9c7600e559646c6e480dfec087c253af1748033688ecb5fb22627f8793f231993b90eac4c48afc086d20f8d58422aec030ad2aadb8c20ba4d33c6a3051b945fd57e610791991f40cefe0f261198ee12ff34d36dc4db92ca4c0e8cdc9beddcfcf5264b06c8e29cfad2dee08845ded64fc42776607f31258c430a551c0f4688a8396826d96d69aa5d67a13167c3038b35bae9396d59410a27bfa0a6a2bb2097e89c6525a97dcd9d005514afc7ebf30de0c2cd61ffc91e8902925ee09a979775d1d29046ed4a5e4a2b50e8a37bb676e17d83fd33736437a1e5ca4d4674119571d24ca51e6dc3e5acafd5027582fa34fb86160f3b8f8b259fab602d0aa67234a9b60f1f72316db387cfb9f1c032112d443e1b7b0fc042e6e8fb05a8523e5e4a3f70dd5352fe4de04dbd6ce85fa4b71a5f0af991ae5d2582e8ad98cb2829169fc9ae331d6e82e0c64e05bb408ac6c60b3e437fb739bcdbca280f19f9487c8ed921cf4f4e605176bffd86389e570657ecf51bad39e56767e83e6f1bceb3cc1d73bdc7da414e602283ace022cb101cb5f99b481f99a9f69c1d5376dd204f717bc492ccf35c7838caddd59290cae0316303e3a9b1c23b5c9dffc88f89238eacc6c87cc70a35206a569a73f11a7d98fec89be8023c436510aa39c26c91d547fb7a22f579d3a58239c5397dda34996b7da6aa5ff72494a1978b249e7406b2b8beb8bc25c6e16c65f01c4365d793540a33fe1b2e9d81a64b7581251c07c9aceebe8a39fe626de41cb2fddb7e220c3ba9ac768c9ae71528f49491f33a0e9ca49fa2ce4991c720c3a1415fd375540cc34e40cc04bcca9b55b97082e2d33e31222424920937380adfb59f4322910c8fe9e550e8a4042343df81d8d0420fafac6096c0358b0698c4bbd631a017a8b5411b4c1c1e486fb0d2acfc19fc534dfa23f97e15385a4970c680914b9fbb5e1274dc56511a59e78201c6ca3d045da811a11d977c2f4000e8dffcc8f44f3aea9b6e79abd48b9d0830ee7095afab8c16c6fb6f99a8355134117a631cc27a44973a0dc34d1aff0568a0631d12eb7acf612d7aeb3c269e3e82fc6c4a4e2f552834e398a68a94a1c69cf884435c3f0e9546083683eea1cb73ecf12dd88385d3db507cf07d28a5257ba7826f915780eaafb1386f42afbb41f85ee78c3396c87a4ea31f11122789e7c9cfa7c65c532c66ef7ee5710779c07575cabbda0d8727341aa29d2001643541d63742a31aaff8763c1da6b4e22843ab2824e18696cdcfc92dff6c980c055dea8495f02a63090bb488b54180794452bbe7e6a2de313fece03a68f93abec0341066adb928003d7d05b7ba681bcd48d52a4c2926c0722830fcf1e3e0bff813ff69145bae12c55420dc7da9f65a2245c9583964e2823ce0c833486c49921b8c5f91d09953bb1459b8dfddcb645a5d44c8ef91c25c0cdb55edb94061f1e86b2caf3a81d844ce97a6dc2f2db7ce071753416d2e8d973db4bdb2c982966085df72b73da386294492e93dcfa637e252486892c81ae58b27f1cb1cba5879f5c1dab04665a1ef837c3ddb11fd08c2b9d1d9c0e0361d80b1043c5c6f6fdcc712398b4b67dba4135c522583185c50227c3a1ebffe6f4048a526cfddadc3f45e19d26e9e9ed0360f4a1a8b2b6fc2f33c8c1127aed3977c4bb6c3cba458df39dcc214deba106768a281f887b1b2cfb3689a2b5ed3524d57aeb898ed9f809fa6c44a52012e31893e7f6cf6524af882fc91904156c8498a7fad1059f8f704488532eb11a63e5411b7fa379f8e56dd1b713290330020b4a9eb516fd45c5fe9643df03040b0ae5f22c713d422c7185a4b6162031f8fe74bef3b6ab841879be61709c91647b2fbdede656f7c17c354593ee05981c02f87b80871c4f09c5155637256d045a5af6367a830cb58a84aed45ec2b85e4d10df15e74f89e4bddba6d303a31ec5b505c7e72a6d3061504606b6b04b5d50d96183d06ebc8a54124e5bb56e3accd22f962b3d56a16c2b8368e40b84d753ccd5c7229d0872f2d9b8da143a5ae76024dae38b186ad6724121326f80b485e1f5dd98eaf3f8622148c8f8fbef5dd6250989b8f841538849a51c338d615ccad4d892c7a44c959ae1ff603c41204167269399c56a4a2de107fc78352f4ab8cfdc6b3545608ea3c086ac878cf6b3717747a7d4f0344412b57a4796011c965a12e960bfd9985d89b4bfde4464af8055c2f4221fb338f40504ae97d7da5b87863b10023388d7c44183357e1a8f88b8791ab39ebad5c8f2988a1d58004e60a35313dcb3a92fa6852f96a9cc823fe28a6964e1d7e500dad2bd05d3d5ce384968c5de1fff372b39ddb91346a43d9b22334fd9b166aed08df6aba61e1e9d41e137afd2b8f1f7b51f58bf05fa1faba01ab0b10b76b0ea81cc88f7276b299c958c340be612fe4276f28f7a42e18384e6f8657d81f7048e914e67ad3a98e76a202980b460fee9aa74b7df3558129c11190e6aa0a2ab71fe7cb1914ff68f82a713f23e507530e7a513b2a4c1f29c7439327bbd3e569cfeb920e666042ee8a53402a822afa700e95cc12558198ca003d670fa2590c7568f80d1bcb1f070ab8e43691437b01fdbf8378b38d09c00d6b437664a9f0fd969c11c966e19e0c027ae76fffc59708d43b7cfbce013904ea11b9dc64df7e63217e0beb41498b1a1d4ebf8f3c586407f8413d0e37499c674b058ee47f6aad86170837a66e827c40f0a082072e0b5225472ce68a74b0e7ec7f527e4b397195d1cd6134cedec99dbcbba84a359757872696ac4c0ca97b4d7810c280542698fd729abc703095d1dfcaba431ca8b9da9b1dbd2d0661161bc24388eab35c6d698bb80322d7fd5b20d81a2839604f5259242f36f8138211aba0441cf475dbc4d4d25b19a0acb312c1c7a3433bda6a8b330431f4c7996a313dec92676b19d30f105f9d4b08aa1550379e06232bd3763d156ef649fe956251d524bd2700bcb858a569fd6b274bda2d565b2a3fc4eea67b1036fec459e067c2512d9666cae3b6db36ed1b73418a70400f3c80a96371cb95ca809d093d7b957119e4d7180184fa8741a4834a2a4c608d87a9d740b88324ace7ce5e963a30c522a29abf98e2597a82b5ad0d5f32ca33099e4999b1ff6764556ea2d39cf8042f2721c3084983cc386e3dedd54414fc49b9d55baab57da604eaa2e6ef729e3f23ce61630434fe1cdecbfec82634181a1f3080d6343572bec17fd856a747229e39f2d71127bc12e361fa6d69db9a4590205a912e1706b6cdde9f0583337afdc81bdc0a65f5cb7b8a49f0e31b23a24da0be40bc119610de1d2c7b1a666f8bd5bff583539d1f3ff43d745ce72f89bd59e6608b66d48da55181fbec3dacbcfbd5887704697574e1836816525ef590beafebfece22940c10ca1b1e38f6215d2a191dacd5d1980690e6ca817dfed6f605f13a87608010ff800c38164e02439242dda2ffed9747b732843ee7ce9de564faa803a7a6c0aead2a8052594029ce7148cc3e884432a323ab6bdbcc43c3d1d441a8e34578a24bd04709130890d235e61671133393563c96a03462257f98390de7aa349db64aa263b4b6f54ada2e141f431aa28ec0286d4586a3bde83305ba24187bf17cf39093dccff6588ac981840087d642399b98194ee9870af4679c782dffeb2e5dedbbc51048e82444148bf0c840b8aec6ca12ff9a70c42a7a85f6d2698253d30b166b6db54890439fcd81066681c0ebf80c2bbaf1822b2d46c0be88b65da8889b48dc1cb8b0cbede3496680fa58580a2d3cbab50b773aad1a2e98937c65c43e6dd463e7cb22645cf796ecf510f4ab638c6c854d47f04cb490bba80faeb98ea7c05648b1878c212aaa08058ca9beeb1fc5f8c45715680e472d802d3541c2d34c7e9780c35c872d377196d460eb01bd3e546f5d8953d1dbf39a4a3565800052e1a0bb4d2d8d5f33690f1d4df6cf48287f674050fa4b460e217800873b73420d5dbc1d09b21f44fe181356e5d9472c1cab18aec698ed509c3eb6b8a756d81584200c1ee732debc8f9bf5a75e8beacc2f1efccf50bffa0e55b6e032eca224e06ac7ef47a047251d2f859a52dc9e199c209dc5e2379319d83c023dfd375c90ac11e136992a42b1b84ff9cc5c53f1f3a425b464a5bec1e8343b15dec6648a333809065ad94e40d5d98457183484f81f5215b9c1b1717317cf5fd8b9eec676a27adb0bfef34112f2998238a0ce68550b844205bc39cbbda30ae4378cf8fd964b599ad9dde89cd077df732c7023b18a5f5ad07012503f87543341aea5606dca76ec4c44aee4704d096019f241ac9dc7a85da352cf3802f460118e1b279cf2a2e1774bd01627fefe14cb986771a1cf08744f8095a1fec03d5d7b20ca6bd738ca1ae00f6213cafaa6efe663a4cf88fe8d7d5938b7b3524b8de3032eb51b8dd06c739500ccd53771b464b103a0810e46fbe54f92e98807a4e5ddd8db17c8a00d00a", 0x1000, 0xade4}, {&(0x7f0000000640)="6cbbf8147e476fe5b8cdea", 0xb, 0x3}, {&(0x7f0000000680)="8d481f1eed273a2106adf1ac0587f3a6ac73cdafbe", 0x15, 0x6}, {&(0x7f00000006c0)="a03fedd1f06fe8a732520d02d2f26cbb802ffa63ae52cf8636", 0x19, 0x7ff}], 0x8000, 0x0) [ 1433.029472] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1433.037698] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1433.049133] EXT4-fs (loop4): Invalid log cluster size: 1946157056 [ 1433.083217] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1433.110464] overlayfs: unrecognized mount option "hash" or missing value [ 1433.232175] overlayfs: unrecognized mount option "hash" or missing value 18:59:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x45, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:14 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0xff, 0x0, 0x0, 0x0, 0x41c1, 0x12008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xd44, 0x1}, 0xc002, 0x0, 0x0, 0x3, 0xfffffffffffffffe, 0x0, 0x8000}, 0x0, 0x5, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$RDMA_NLDEV_CMD_RES_PD_GET(r2, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="280000000e1402002abd7000fcdbdf25080001000100000008000300020000000800030000000000"], 0x28}, 0x1, 0x0, 0x0, 0x80c0}, 0x8000) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) 18:59:15 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6, @rand_addr, 0xe00}, 0x1c) 18:59:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000001c0)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$X25_QBITINCL(r2, 0x106, 0x1, &(0x7f0000000080), 0x4) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_GET_DYING(r3, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x6, 0x1, 0x3, 0x0, 0x0, {0x5, 0x0, 0x4}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x8c0) mq_open(&(0x7f00000001c0)='$,%@\x00', 0x800, 0x40, &(0x7f0000000200)={0x6, 0x7d3, 0x7ff, 0x1}) 18:59:15 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="2275000048000000f3ff000000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0x0) read$fb(r0, &(0x7f0000000080)=""/75, 0x4b) 18:59:15 executing program 1: ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000380)={0xfffffff, 0xfffffff9, 0x3fc4, 0xffffffffffffffff, 0x0, &(0x7f0000000340)={0x980913, 0x9, [], @value=0x8}}) accept$ax25(r0, &(0x7f00000003c0)={{0x3, @netrom}, [@netrom, @rose, @default, @rose, @rose, @bcast, @default, @netrom]}, &(0x7f0000000440)=0x48) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/mdstat\x00', 0x0, 0x0) socket$kcm(0x10, 0x2, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') r3 = syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x800, 0x141000) sendmsg$IPVS_CMD_NEW_DAEMON(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000580)=ANY=[@ANYBLOB="340000005d9f2f35cd023eb01396c0196d5000a69966e17cd5520142f275e107633abd361b644cff73270fe950fef06a8b0dc504a130591253b7fd56fd8d444d76738ce137ddc87c933f40934902504c7abc0046464596b0ae829a8f64cc2109c217b125d2d10db021be15c60d3c1c394fe95886663f26889c68ddd94042651f07b6f8922beb2b3d4b0a79591763e5cf72687df0a9ff10227569234e13919d91b9acbcc1079f2ce2df04ba39bc835b96e287d54b0524d9645f8870f900df", @ANYRES16=r2, @ANYBLOB="0100000000000000000009000000200003800800010001000000140002007663616e3000"/46], 0x34}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x30, r2, 0x8, 0x70bd25, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xffffffff}]}, 0x30}, 0x1, 0x0, 0x0, 0x810}, 0x4004040) r4 = socket$inet6(0xa, 0x3, 0x11) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000200)}, 0x2000800c) setsockopt$inet6_int(r4, 0x29, 0x3c, &(0x7f0000000140)=0x63a5b074, 0x4) setsockopt$inet6_int(r4, 0x29, 0x3e, &(0x7f0000000040)=0x3, 0x4) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$sock_x25_SIOCDELRT(r6, 0x890c, &(0x7f0000000480)={@remote={[], 0x1}, 0x3, 'veth0_to_team\x00'}) sendmmsg(r4, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x563, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvfrom$inet6(r4, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1433.498974] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 18:59:15 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) [ 1433.610474] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1433.617684] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 18:59:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x53, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:15 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCL_GETSHIFTSTATE(r2, 0x541c, &(0x7f0000000080)={0x6, 0xc3}) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f00000000c0)=0x2, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) [ 1433.734550] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 18:59:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef4fa203", 0x3d, 0x400}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='\x00']) [ 1433.797805] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 18:59:15 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCNOTTY(r2, 0x5422) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) 18:59:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x300, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) [ 1433.869929] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1433.900831] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1433.912748] EXT4-fs (loop4): Invalid log cluster size: 1946157056 18:59:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef4fa203", 0x3d, 0x400}], 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0063ef70a36d61421014ae6f07c3ef2e20304a7e7cc24df66894dbca9658eff99bb68cdd97787d4fd091c15946369d595f3db005697459b5910607703d0f96"]) 18:59:15 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x3000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) prctl$PR_SET_ENDIAN(0x14, 0x2) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, 0x0, 0x0, 0x4008115, &(0x7f0000b63fe4)={0xa, 0x2, 0x6, @empty, 0x101}, 0x1c) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x68, r2, 0x8b8e0eb13081c495, 0x0, 0x0, {{0x1, 0x0, 0x5901}, {0x0, 0x4}, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x68, r2, 0x4, 0x70bd25, 0x25dfdbfc, {{}, {}, {0x4c, 0x18, {0x3f, @media='eth\x00'}}}, ["", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008084) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, 0x0, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8}]}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_SET_MPATH(r4, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x40, 0x0, 0x508, 0x70bd2a, 0x25dfdbfd, {}, [@NL80211_ATTR_MAC={0xa, 0x6, @local}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @local}, @NL80211_ATTR_MAC={0xa, 0x6, @random="e73b9c5fc800"}]}, 0x40}, 0x1, 0x0, 0x0, 0x40010}, 0x20000000) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r4, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, r5, 0x2, 0x70bd28, 0x25dfdbfb, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0xc000}, 0x4000000) [ 1434.011786] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1434.082084] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1434.106930] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1434.113011] EXT4-fs (loop4): Invalid log cluster size: 1946157056 [ 1434.203349] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1434.211024] EXT4-fs (loop4): Invalid log cluster size: 1946157056 18:59:15 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6, @rand_addr, 0x1802}, 0x1c) 18:59:15 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = accept4$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @private2}, &(0x7f0000000280)=0x1c, 0x41000) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$IMCLEAR_L2(r4, 0x80044946, &(0x7f00000002c0)=0x1d) bind$inet6(r3, &(0x7f0000d84000)={0xa, 0x4e24, 0x8, @private1, 0x1000}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$KVM_TRANSLATE(r6, 0xc018ae85, &(0x7f00000000c0)={0x3000, 0x10000, 0x4, 0x3, 0x86}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendmsg$NFT_MSG_GETOBJ_RESET(r6, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000001c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="64000000150a010400000000000000000a00000108000340000000070900010073797e30000000000900010073797a3000005f000900020073797231000000000900020073797a30000000000c00064000000000000000010c000640000000000055332b30451d482f56aa847f8e5daa04000209eb511b1b4986bc7ed4a07ad72b200634f5d5dc205681752abc2d2b36014932dd664e536f694409bf8bbb9e26d3922744da"], 0x64}, 0x1, 0x0, 0x0, 0x4000000}, 0x10) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) 18:59:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x39b, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) setpgid(0x0, r3) lstat(&(0x7f0000000100)='./file0/../file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000040)='./file0\x00', r4, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(r1, 0xc0286405, &(0x7f00000000c0)={0x5, 0x1ff, {r3}, {r4}, 0x6, 0x1}) lstat(&(0x7f0000000100)='./file0/../file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r7, 0x84, 0x6e, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @private0}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000e852636d5ce4233f479a508c731e21b37a9deeea226fb77914550c5ec6be9526e272631f2c70461b8e7775dd872d2a3e71f3aeffc3afc348d3835decfbd2f1f4669679317286e077506976ffa96a7aa69c72b8013fe92d2b73c640a17acbc0f0f9e3b9bcc7628db98f7f33b3ade7ef6066335a26aff9834f41d0503834596e35b880ce1a45f47ecad4c2fe", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x66, &(0x7f0000000040)={r8}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000200)={r8, 0x4d1a, 0x20, 0x6, 0x80000000}, &(0x7f00000002c0)=0x18) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000380)={r9, 0x68, &(0x7f0000000300)=[@in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x44}}, @in={0x2, 0x4e22, @broadcast}, @in6={0xa, 0x4e20, 0x8, @local, 0x7}, @in6={0xa, 0x4e23, 0x54, @mcast1}, @in={0x2, 0x4e21, @loopback}]}, &(0x7f00000003c0)=0x10) chown(&(0x7f0000000040)='./file0\x00', r6, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='measure,smackfshat=,obj_user=ext2\x00,uid>', @ANYRESDEC=r5, @ANYBLOB=',uid=', @ANYRESDEC=r6, @ANYBLOB="1b00000000000000", @ANYRESDEC=r4, @ANYBLOB="2c736d61636b6673666c6f6f723d295e24297d29235e282c646f2fd289f72eab3e5fef8f4bd8dbbfa8"]) 18:59:16 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x11) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000140)=0x63a5b074, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f0000000040)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x563, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) ioctl$FIOCLEX(r0, 0x5451) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x400, 0x0) ioctl$EVIOCGSND(r1, 0x8040451a, &(0x7f00000002c0)=""/231) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x80000, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000180)=0x4) 18:59:16 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x40, 0x0) getpeername$netlink(r3, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="2275000048000000f3ff000000000000", 0x10) r4 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvme-fabrics\x00', 0x400000, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ftruncate(r6, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f00000000c0)={0x0, 'bridge_slave_1\x00', 0x2}, 0x18) r7 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r7, 0x0, 0x30007, 0x0) [ 1434.458907] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 18:59:16 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r2, 0x80083314, &(0x7f00000000c0)) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) [ 1434.545784] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 18:59:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x3a9, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) [ 1434.589173] Unknown ioctl -2143271654 [ 1434.622564] Unknown ioctl -2143271654 18:59:16 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x11) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000140)=0x63a5b074, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f0000000040)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x563, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = msgget(0x2, 0x2) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) inotify_add_watch(r3, &(0x7f0000000100)='./file0\x00', 0x80a) msgctl$MSG_STAT(r1, 0xb, &(0x7f0000000080)=""/99) [ 1434.656466] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1434.669786] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 18:59:16 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) write$P9_RMKNOD(r1, &(0x7f0000000140)={0x14, 0x13, 0x2, {0x40, 0x3, 0x8}}, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0x40605346, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x1, 0x5, 0x3, 0x2}, 0x4}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fremovexattr(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="bed00d8f8cb9e65e65a0864835841c25a9845620529ee01b46bca3e32daae7"]) writev(0xffffffffffffffff, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r4, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) ioctl$DRM_IOCTL_MODE_DIRTYFB(r3, 0xc01864b1, &(0x7f0000000200)={0x3, 0x0, 0x0, 0xa, &(0x7f0000000180)=[{0x5, 0x0, 0xa209, 0x7}, {0x8, 0x912, 0x4, 0x9}, {0xd01, 0xffff, 0x58f0, 0x3ff}, {0x641, 0x5dcf, 0xfff, 0x100}, {0x1, 0x6d9d, 0x9, 0x1}, {0x0, 0x8, 0x0, 0x1}, {0x6, 0x9, 0x0, 0x7}, {0x69, 0x1c7c, 0x9, 0x400}, {0x5, 0x5, 0x800, 0x4}, {0x4, 0xe5d, 0x1, 0xe153}]}) setsockopt$inet6_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) 18:59:16 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x11) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000140)=0x63a5b074, 0x4) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x0, 0x0) write$P9_RWALK(r1, &(0x7f00000000c0)={0x3d, 0x6f, 0x2, {0x4, [{0x4, 0x0, 0x7}, {0x2, 0x4, 0x7}, {0x4, 0x3, 0x7}, {0x8, 0x2, 0x3}]}}, 0x3d) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f0000000040)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x563, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1434.828667] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 18:59:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x3fb, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) [ 1434.955951] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1435.033578] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 18:59:16 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6, @rand_addr, 0x3f00}, 0x1c) 18:59:16 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0xfffffffffffffff8}, 0x500c0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$USBDEVFS_REAPURB(r1, 0x4008550c, &(0x7f0000000740)) writev(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet6_tcp_buf(r5, 0x6, 0x21, &(0x7f0000000640)=""/192, &(0x7f0000000700)=0xc0) r6 = dup(r3) sendmsg$OSF_MSG_ADD(r6, &(0x7f0000000600)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x4bc}, 0x1, 0x0, 0x0, 0xd29d5bb6d8b54e1d}, 0x200000c4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendto$inet6(r6, 0x0, 0x0, 0x48000, &(0x7f0000b63fe4)={0xa, 0x5, 0x6, @rand_addr, 0x1000}, 0xfffffffffffffe62) 18:59:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x47c, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) [ 1435.325173] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 18:59:16 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="227500000300"/16, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0x0) 18:59:16 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x414080, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5, 0x8}, 0x0, 0x8, r0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) 18:59:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x0, &(0x7f0000000200), 0x20020, &(0x7f0000000080)=ANY=[]) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x8, 0x2, &(0x7f0000000240)=ANY=[@ANYBLOB="85100040feffffff9500000000000000"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r0, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000080)='ext2\x00', r1}, 0x30) r3 = inotify_init1(0x80800) fcntl$setown(r3, 0x8, 0xffffffffffffffff) fcntl$getownex(r3, 0x10, &(0x7f0000000080)={0x0, 0x0}) setpgid(0x0, r4) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$inet_udplite(0x2, 0x2, 0x88) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = socket$inet_udplite(0x2, 0x2, 0x88) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$vim2m_VIDIOC_EXPBUF(r10, 0xc0405610, &(0x7f0000000100)={0x2, 0x3f, 0x0, 0x779e751014f086f9, 0xffffffffffffffff}) kcmp$KCMP_EPOLL_TFD(r2, r4, 0x7, r6, &(0x7f0000000140)={r8, r11, 0x3b}) [ 1435.434954] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 18:59:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x47d, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:17 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000041c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r2, 0x84, 0x74, &(0x7f00000000c0)=""/202, &(0x7f00000001c0)=0xca) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) [ 1435.591222] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 18:59:17 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='veno\x00', 0x5) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) socket$bt_hidp(0x1f, 0x3, 0x6) 18:59:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef4fa203", 0x3d, 0x400}], 0x120000, &(0x7f0000000380)=ANY=[@ANYBLOB="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"]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT64(r1, 0xc0984124, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}) 18:59:17 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x11) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0xc68, @remote, 0x4}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000140)=0x63a5b074, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f0000000040)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x563, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x420ac2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r1, 0xc0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x3, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x4, 0x1}, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x7, 0xd0ce, 0xe11}, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x2}}, 0x10) 18:59:17 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x18080, 0x0) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000100)=@usbdevfs_connect={0xff}) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) [ 1435.713957] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 18:59:17 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6, @rand_addr, 0x4000}, 0x1c) 18:59:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x47e, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:17 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) add_key(&(0x7f0000002000)='logon\x00', &(0x7f0000001000), &(0x7f0000001000)="2e989cc9f58ec796be4720e6160291a2fb7c6445e84b8e9e349ead029fe38d5810bf992b5d51f406a51cc339021268aed6f767582af42dbc8ea1110e4353fcf30b20f1f27ed3b44bef6444f8ca6a808e34ded636ef55e151c11b4ef7a5384f4a0ceb885759dfeeca5aaa540de461d2130755897533032f5639c4ba79988a49d63084f2cbed0a84e5e733146f15192fdabd0e3a", 0x93, 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) [ 1436.212251] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 18:59:17 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000d00), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$x25(r2, &(0x7f0000000e00)="a0ad07463f13017c08e21791d4c997408b1fb294378056f99b6961db4241b63a6a98e8641a42627e2f1dc3f303fca7421e039463025c7b02d30deed8ffa8732efb1cf923a64692b16f8e4e806c96ff7f8e3a7ac09c0c59dde07367884e8445863c7091946bea972385cb51a2616549d9116f9acf70365640447cf0aeb743d5848c05c77a", 0x84, 0x20004042, &(0x7f0000000740)={0x9, @remote={[], 0x3}}, 0x12) r3 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r4) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000980)='/proc/vmallocinfo\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f00000009c0), &(0x7f0000000a00)=0x4) sendmmsg$sock(r3, &(0x7f0000000d80)=[{{&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, r4, {0x2, 0x4e21, @empty}, 0x1, 0x1, 0x0, 0x3}}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000140)="37e34d4b5b04efa52b07ca5b162c621a4794d8274727edecf5054fa68d691092c920c066a0dc0fa1da588a8a1dfc74e8ee48fa02cde9238ae8c6d27ebaed78f8aa85bef7e2290fb9e8dab08d543f728608a19601d1bbcc1cb3331a7a27452d12af446bb418c88cf4d210900a323a6481866407bf3b38fba34b4f6503883a7ecc2cedd980578a6091e21cae96887a672cee1cc7b628e6ef217199060a2e336a37d7674d557b559f66b00b084633fe26d39ebc1bee4aab9e28918ebe1e0d1cefe4eca4ab5aaa75824dcb11db9df08fb53e", 0xd0}, {&(0x7f0000000240)="6b3dcd38393bd8f626d49515ab8f03a0f02072bba95d2848b9940ad0b5c75d3375fc7290c9037071f4aa046a95377bf6e0986121a46e8e66eca3a26577b6fb782d1daa4b57220489ec4cad7bf749d565cf16133536af6e17f58511c7f75aa7f5e683b2c2a657d01897e806b8d085d521dbf52d32218780ce5ce11cd7ed687fb0028fb260f9f2c726aeabc7310a414dc19f5abf264b91882b8e7418296d8653f669e3a1744af60a85d7cea6975029c06a1bde18d182d2df1c3f110c58cf40fe700ba064632c0f7970b4813fde81dc398d0265055fd3b54fc6623455c9070b710b2b62b0235b1f2ac78cb734e0d1099ef2daba1dffd99abeb117", 0xf9}, {&(0x7f0000000340)="640c2894ca4ea14129ff67af9cab40469c17c40eb6052e", 0x17}, {&(0x7f0000000380)="c174b252fd046b4ff33de2b65e557936484b1fb15e8edf9b634e0d2809e1cdc684d1538f19ca99e05678efc934cff4616c7ccc7459351f3de5190f6e191dfed8f9d41d9ddb9bbbb89fdfbfacbe78f27e09305db9e173c094306e60db157b0f41c9642c0138fd33cd738d0459115417154584e28e53ec0ed0b5cb0c077f578b01bc233cda0ee1799e197408c647ac1c51e02eb9f884aaf38d46ba9746f2434fa28194a3d4438e859924c3380501a2b949a55dd72d89040255fff55234af1e4b06bf07c4f4f3c6e623723a5ebd32211206d0c9eea76268794c762623f3efa4f56caf34fac61cb56736115d2d13b5c19929ffc23951dc1f4351e6a9ec", 0xfb}, {&(0x7f0000000480)="2445adfe3717126c35b8df7a369cf44f9c0f02cba3e6bd34dbd29d48b93856c406853e8f7e1ed8312d9bb75298b8c732735b", 0x32}, {&(0x7f00000004c0)="707efeb73e8cb023644b829b053c0a6d5c2a98a85b365057dda65359d6ce20a9b3b2862abf598fff326767d61ac6c2c5678a973a1ec8a66ad36bde7e80b2bd0e306bce34aec45326667ab6c2a57c312785f4caa30a49e3e8b652d67a908aa86fea55052b4f04e98b1cfb7d5c8a68d6b3cac07b059b822d3e4908999a20bb187daa8d13145aba00b96538232a3a17023ef304766d820601850594a910122d6db38c25fe0734e411941ee47eb29a325e3d06d1cfeecd43e009c568399b00f28703a05d6ddf28a02d3b45e4389478453fd345a9ab6041c1f14951b8db419db6", 0xde}, {&(0x7f00000005c0)="f594486f46e2e03cfbc805ecd56500f8afc4404ddec8ab695bb2e4314dcb47b3feaa3bcb8e910cb6b8a0cc310c9c003187e30be0d256ffc4a6758102b5d9b5ada2c6b06c69ec5685081c4f1b4b8173a7b71ed61dfc3b465e88e09e1e65e67423f669329e6cd5ce74b539a50351064d28fb04ae8a27b31c", 0x77}], 0x7, &(0x7f00000006c0)=[@mark={{0x14, 0x1, 0x24, 0x2}}], 0x18}}, {{0x0, 0x0, &(0x7f0000000c40)=[{&(0x7f0000000700)="595102d450ae7364a8464b8511beca2ec4954994edfb65bbc590953d80103609e30853c5", 0x24}, {&(0x7f0000000ec0)="902246466ea6a8a92221c5e53716b9ff23ab43cc706e2b3b213b11469ac57083ed31e89c5c435342f57621d585868f7c7dbe857349961dda3835d5170d0b831863e4ea07f30670e48f369ea5131c241e43c7c29d3202e94883bf14f027e970934d2983f5ec8f4c892fbcc9d23cead7853720109ce51d1fab36c396a4b347", 0x7e}, {&(0x7f0000000780)="b6a7c0e187e8bf59cab94f386fbefa9091e01347234d1208045d", 0x1a}, {&(0x7f00000007c0)="356a47c16e9e9d21a9edd8dccb00cf93c9eb57c2b1c45c3587da26fc09b7dc1d95965c462fe30603ecd8333de89e8139d61d6c5c4aac015f361426f96f03e201a57b57733ddcb7bba9a5a0135d0ecfd5b5c40d62612911b77302bb9b0e511e93654791646966e04c29bba5c27751c9ccf446eedc50cb34f189bfabaef7caba2f01edf1c81ad87f8fe7a0894ad5a52b52e7ee6730db93f17466b5749d238e66dcaee4044c552405eaf0058e95a728942aa63076cc26b3423b3b4a1868dcd074543990a5d019636f3ed97b36f856", 0xcd}, {&(0x7f00000008c0)="940e5bf8d2b0d0175a2ef7fcb16a08c227802d1a2c789ed8dc74b7733243988d2192188584dc6fa5db0f25d4807cf5b5a1e67f845c841e900636c95bdad7b03576a5559dc699eea20a3409d35a278a37697db6173eb65fdf62c6242f95a3d897361240e95a433ec003a53e6b6012d8993b151171d2b72f0760bb1abba2", 0x7d}, {&(0x7f0000000940)="6e58077c7144109ccd3ec4849210a9", 0xf}, {&(0x7f0000000f40)="cade3150f654977dc724d4a952111a69e7efd1488e817a650189fb0cca0f0cc78b9888b00cf6e2d3106489396871928164e75c6247c672c8dc8513db9101b8e7e717f51ce0cf3c121fd04f07bfb3a7f69703f791f0937bfdbb4636735aa1c7a662feaf319315913a0fbedd5ed3292eef3d4897c9d0d92b2f013f14a64972fe07b61317a9cecd53a18c7fdd4f896da99ca424835f170baeabe96cadd747ea946eba148933669658f8695b4298ac18fe47683a98640c43e958399dab894b15ddbcf0dbaf85641c669f7e9ec1568c46fdf912f4984eed69c36a1ae94770075c7f50c8e8aa3bcb26805c70f7bb99829793cca7f1", 0xf2}, {&(0x7f0000000a80)="7d1a69c077db4c4d4c7ab619751b0f65ba89a51b8f8461a472ed8cb57ba38e857e2fbe7ad1dcb0c7e7a776b017d3d74b7a5aada3e9287c45a12c7924d644890f430b08cc7f686b3b0eece9f4a1c3141ef16b12db3a93e3b046c5c549494006d354d1f8ad2d216e9a25fb395a016ad7dd1a4f21c03398ff404fe7b583b2c9e3221cd43de80789988dd51620b758201659b77ab47ad6e440f93060663791a6081d3482c73eb00e432c3852aee9f948894907103c4090954201ed1b0b3ae1c7cc6ea2e17060462cb6ede6a8a318829d08a2e6be1f5090ccd206df2338", 0xdb}, {&(0x7f0000000b80)="809cbf4b5d9c2f09c919b4c62a143f6d3727cade7bde4c2de0fe28ef97d54dc41ae0a636a530f174b04e237e12510375a4aae1b3e3c49a4e8b81c3f1cf54e00f09b170ee927975b60f990defa4a4f332036ee84454ed1074b448fdfae7600a5a11984e1f981804fc011581b63debf78e749170ff25c36eff7e7ba966f36666e6d4b1eb2f2f976d4b3de5e5", 0x8b}], 0x9, &(0x7f0000000d00)}}], 0x2, 0x44081) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) 18:59:17 executing program 4: ioctl$VIDIOC_S_PRIORITY(0xffffffffffffffff, 0x40045644, 0x3) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef4fa203", 0x3d, 0x400}], 0x2810400, &(0x7f0000000080)) pivot_root(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000100)='./file1\x00') 18:59:17 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="2275000048000000f3ff000000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$sock_SIOCINQ(r6, 0x541b, &(0x7f00000000c0)) splice(r0, 0x0, r3, 0x0, 0x30007, 0x0) r7 = socket$inet_udplite(0x2, 0x2, 0x88) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = inotify_init1(0x0) fcntl$setown(r9, 0x8, 0xffffffffffffffff) fcntl$getownex(r9, 0x10, &(0x7f0000000080)) io_submit(0x0, 0x2, &(0x7f00000002c0)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x6, 0xfffe, 0xffffffffffffffff, &(0x7f0000000100)="62492ce8612b117edd0d2ec86ae0886470b110bf030b66069350aa4824a1eb01ffda26931b0de71d838c", 0x2a, 0x8, 0x0, 0x1, r8}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0x80, r9, &(0x7f0000000180)="0f54240a6dc26f962942f512cd65f173b122f01c7d3d2d9c931de05b2ceef07975819d871b59ee24834cdf2c423568e68fdefb83e9edd432306f9bdaee9418520c9ef3fb1047486d7554a3026b31ff66aa3470359eac2fa963209780ce04e8726aef6a30800ffedb3a5b420febf553824407c0efb19e7d3d0db769772557b75961548bd0b43c61170255b009ce2103248506bc430d2d8286a3f1325d5be33a1a9c518c4b345ac7570900546589341d4ee58cbb554c1daee53bdd6c7c22e5a6872c4e7bb92c1d6694f05525c3586a0abf89c6648c9485a878f0d2cfa81b9650deb479a5976eaaf67941234e5b04b3c3", 0xef, 0xfffffffffffffffb, 0x0, 0x2, r0}]) [ 1436.320714] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 18:59:17 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$RAW_CHAR_CTRL_SETBIND(r5, 0xac00, &(0x7f00000000c0)={0x1, 0x7, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x20044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0xf7b9ca4fac8412c2) writev(0xffffffffffffffff, 0x0, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f0000d84000)={0xa, 0x2, 0x4000, @rand_addr=' \x01\x00'}, 0x1c) setsockopt$inet6_tcp_int(r6, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r6, 0x0, 0x28, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x4e20, 0x10000006, @rand_addr=' \x01\x00', 0xfffffffd}, 0x1c) 18:59:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x47f, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) [ 1436.382333] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1436.398068] EXT4-fs (loop4): Invalid log cluster size: 1946157056 [ 1436.440538] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1436.454066] EXT4-fs (loop4): Invalid log cluster size: 1946157056 18:59:18 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x6, 0x0, @rand_addr, 0x2e663bba}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) r3 = dup(r1) sendmsg$NFT_MSG_GETGEN(r3, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x10, 0xa, 0x201, 0x0, 0x0, {0xa, 0x0, 0x2}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x404c000) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$RTC_ALM_READ(r5, 0x80247008, &(0x7f00000001c0)) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) sendmsg$inet6(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000200)="92eb8630206b50c99295b9f3bb2c8ce7b9a7e5c4ef58990095aba48f754a0e00f8305b383c4e93cbc6fdde9e4cc054d72581b3459a3007c340127965befe374747a60e5ac326e99c2ae4bf15", 0x4c}, {&(0x7f0000000280)="b612ee9737ecde72e817e20a041d3c1c71216cc2b767b2c7aa26538521399b3d864fbf59f36cacf36de57729b8eb342b0b7badfea3dfaab6f6", 0x39}, {&(0x7f00000002c0)="dd26db8aff2b80afa17aaf2e3ffd69222cc457cbde95107802e366ba3494412e244ea0b600b96196dd881236f431dd4bf127952f640973fcc3cf1328683c5fa09afdf5245e002ca0baa8", 0x4a}], 0x3, &(0x7f0000000380)=[@flowinfo={{0x14, 0x29, 0xb, 0x8000}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x80}}], 0x30}, 0x4000001) 18:59:18 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef4fa203", 0x3d, 0x400}], 0x0, &(0x7f0000000080)) [ 1436.572130] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 18:59:18 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @private0}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000200)=ANY=[@ANYBLOB="010000007a0206cf484c93608789c66b0192b5f8b37c7b2f9873dca505e8661ba2191360650016b680436fef5f1eae440ad45a982c5ea4e38de7199da04dd9f0c2d934801cb2d0ffe06abb3d1b8a143c227ae4a10025646213ce8187578b5e2a89d11a1cfbc122c5845a56f1c3b1d7", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000040)={r5}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f00000000c0)={r5, 0xff37, 0x10, 0x401, 0x7fff}, &(0x7f0000000100)=0x18) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @private0}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000140)={0x400, 0x2, 0x0, 0x177, 0x800, 0x1, 0x3, 0x0, r7}, 0x20) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) [ 1436.712690] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1436.729020] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 18:59:18 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x11) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x4b, &(0x7f0000000140)=0x63a5b076, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_int(r4, 0x29, 0x38, &(0x7f00000000c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x563, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000740)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, &(0x7f0000000800)={r5, 0x6, 0xdc}) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$nfc_llcp(r2, &(0x7f0000000200)={&(0x7f0000000180)={0x27, 0x1, 0x1, 0x5, 0x3, 0x9, "ce93e68ac4fab490fe9a7be6e3e2692e758c3173edc37027d4e19ffcb53fc1dc96b8a79b909ee871dfd72d8c2fae8916fd66769070f8f9a96a4421302f9818", 0x3f}, 0x60, &(0x7f0000000600)=[{&(0x7f0000000040)="1971dc2729b5f9c5174dc8601d6e680f24711a5b78c52af2e1c7b9", 0x1b}, {&(0x7f0000000100)="280ae10855e5df3e9c96f152b02bc763c64f831fac0e8a30931207977acf28594e80f8173c", 0x25}, {&(0x7f00000002c0)="29cf3f4aec30549668fa58a5e9011aaa8bd8caaf65692cff011e37ae7db1a5b2ceac52c3fc56e934518be06fd04566312bdfd5e1cfc4c0af8eff2f5a6d73433c6972d0511175bf5003fa867dc80bfdbe83ff5c0ef5fa6d7728bdfd7f9a7e317e2baead1fb8cb8222223578ff2af23fc7492b25f2ad5378f79241ff546b0adc9a6e5516ea9e92227554e67ca3f95f5b4415d92e6dfc7272a3202c7b", 0x9b}, {&(0x7f0000000380)="8ec3ffd6d667facf3fc001da9646a9297eb024909bf4575bae2f363b93f6a29743def7beadb612478b9a06513c6eaee0aefd0d0cc50c34cec3f770ede1f3bdc37402", 0x42}, {&(0x7f0000000400)="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", 0xff}, {&(0x7f0000000500)="a5f597d90fea96327e9f0aba76ac90693a0b18ea9d931a531e77d7f881d7a6b7d28667713936aa7e4736868a6b3868a41c4a84faff50e498830b7cdfff9d0b7f13c5e8ee1e9323156f2a29611c589aba617a231e22d877d795dce02059f5327565c1cd6251382fe9a9a07a0a1e31e40583a0668c485801acce24392eff52c171d41caed06b5878393e6c42ca5f8bdff136618ce81be03e8c11cdb6fbad958233f136546d95700d04b3a904ee50e373bdc63e796b83bd7a8c345945660d4e084d1cc8cb0c1f54b59a24f3f29b91e34f67", 0xd0}], 0x6, &(0x7f0000000680)={0xb8, 0x10d, 0x1, "32ca0c2d1416922eeae5069c1728d35f35b109e29cf1f735f1bacf13c127f46887c7e803d23b2c70b225317fad5c24fdb8ac7b25424816c4557d14d9c0419ee191dea65fa8fa0df381e33c43d2cf9b6894762e026501bca20530d841c2252d4538224ab02fb751d6366effc547811989a40cd2da420a36d6cf1151e68971f93961e8aa34f374ea2908c76dd8b026e7285618cd0f7292dad3de3766076c6147a63bb3"}, 0xb8, 0x50}, 0x0) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$USBDEVFS_RESETEP(r7, 0x80045503, &(0x7f0000000080)={0x7, 0x1}) [ 1436.760724] EXT4-fs (loop4): Invalid log cluster size: 1946157056 18:59:18 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6, @rand_addr, 0x4002}, 0x1c) 18:59:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x480, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:18 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x80002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="2275000048000000f3ff000000000000", 0x10) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) fcntl$getownex(r6, 0x10, &(0x7f0000000080)={0x0, 0x0}) setpgid(0x0, r7) ioctl$DRM_IOCTL_GET_CLIENT(r5, 0xc0286405, &(0x7f00000000c0)={0x4, 0x0, {r7}, {0xee00}, 0xffffffffffff0000, 0x1f}) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r3, 0xc1105511, &(0x7f0000000140)={{0x3, 0x0, 0x1f, 0x9, '\x00', 0x6}, 0x0, 0x1, 0x800, r8, 0x4, 0x7, 'syz0\x00', &(0x7f0000000100)=['hash\x00', '-\x00', '%\x99:\'\x00', 'vmac64(aes-generic)\x00'], 0x20, [], [0x5, 0x67, 0x8bf8, 0x1]}) r9 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r9, 0x0, 0x30007, 0x0) [ 1437.178617] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 18:59:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x481, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) [ 1437.264753] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1437.374929] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1437.429930] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 18:59:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x482, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:19 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$UFFDIO_WAKE(r2, 0x8010aa02, &(0x7f0000000200)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KDSETKEYCODE(r4, 0x4b4d, &(0x7f0000000300)={0x1e, 0x3}) r5 = syz_genetlink_get_family_id$devlink(&(0x7f00000001c0)='devlink\x00') sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[@ANYBLOB="eeff", @ANYRES16=r5, @ANYBLOB="010029bd7000fddbdf251c0000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008000b0009000000"], 0x3c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r4, 0xc0045520, &(0x7f0000000380)=0x960e336) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, 0x0, 0x0, 0x20000804, &(0x7f00000002c0)={0xa, 0x4e22, 0x5, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 1437.636851] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 18:59:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x483, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:19 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x11) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000140)=0x63a5b074, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_S_EDID(r2, 0xc0285629, &(0x7f00000001c0)={0x0, 0x8000, 0x0, [], &(0x7f0000000180)=0xff}) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f0000000040)=0x3, 0x4) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000003c0)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICREMOVE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, r5, 0x100, 0x70bd2d, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @remote}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x24000010) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$inet_mreqn(r4, 0x0, 0x23, &(0x7f0000000080)={@local, @empty, 0x0}, &(0x7f00000000c0)=0xc) lstat(&(0x7f0000000100)='./file0/../file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000040)='./file0\x00', r7, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@mcast1, 0x4e24, 0x401, 0x4e23, 0x5, 0xa, 0x80, 0xa0, 0x73, r6, r7}, {0x10000, 0x2, 0xfffffffffffffffe, 0x6, 0x3, 0x80000000, 0x1, 0x8}, {0x0, 0x4, 0x7f, 0x6}, 0x4edbdb45, 0x6e6bb4, 0x0, 0x0, 0x3}, {{@in6=@local, 0x4d5, 0x2290246c9d8a09fa}, 0xa, @in6=@mcast1, 0x3502, 0x3, 0x0, 0x2, 0xffffffff, 0x4, 0xe8b8}}, 0xe8) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x563, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:59:19 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x2800, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000100)=@usbdevfs_disconnect={0x9}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@filter={'filter\x00', 0xe, 0x4, 0x290, 0xffffffff, 0x98, 0x98, 0x98, 0xffffffff, 0xffffffff, 0x1f8, 0x1f8, 0x1f8, 0xffffffff, 0x4, &(0x7f0000000140), {[{{@ip={@private=0xa010101, @empty, 0xffffffff, 0xff000000, 'geneve1\x00', 'ip6_vti0\x00', {0xff}, {}, 0x4, 0x3, 0x3}, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0x98}}, {{@uncond, 0x0, 0x70, 0x98}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x8}}}, {{@ip={@multicast1, @broadcast, 0xff000000, 0xff, 'veth0_to_bridge\x00', 'veth0_macvtap\x00', {}, {0xff}, 0x1, 0x3, 0x28}, 0x0, 0x98, 0xc8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x2, 0xfe}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x2, 0x6, 0x2}, {0xffffffffffffffff, 0x6, 0x1}, 0x9, 0x5}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2f0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) [ 1437.833910] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1437.909769] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1437.948288] x_tables: duplicate underflow at hook 2 18:59:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x484, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:19 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6, @rand_addr, 0x80fe}, 0x1c) 18:59:19 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$TIPC_DEST_DROPPABLE(r3, 0x10f, 0x81, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000040)="2275000048000000f3ff000000000000", 0x10) r5 = accept4(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x30007, 0x0) 18:59:19 executing program 0: r0 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x8, 0x111081) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @private=0xa010100}, {0x2, 0x4e21, @local}, {0x2, 0x4e20, @remote}, 0x311, 0x0, 0x0, 0x0, 0x2, 0x0, 0x800, 0x80, 0x8000}) syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000240)=ANY=[@ANYBLOB="66696c7465720000000000000000000000000000000000000000000b00000000a8000000e3b2ec60fe8cba1f0309f8f81008ef2691fc74f3b4da9f093f31a98afc3236f1fea0226d354d4234e273003ec8988e9bf281fe0e365d9259c60bb5e9b5c5f62511720875e04f71655569a0e274cd0e285e765a4ffa036d2dd08371de9dcfd3211090e978ba8efd8fd3a3542aa78e7b405c224d0831e10d683145871eda2a3cdc4e0be17d3605d5edb3f5dd965758eda44cc02e412857f5a700"/204], &(0x7f0000000340)=0xcc) writev(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r3, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/98) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) [ 1438.139964] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1438.223645] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 18:59:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x485, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:19 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x10000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f00000011c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000380)="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", 0x4e2, r1) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getgid() keyctl$chown(0x4, r1, r2, r3) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) 18:59:20 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) setpgid(0x0, r2) prctl$PR_SET_PTRACER(0x59616d61, r2) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x3ff}, 0x1c) [ 1438.438330] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1438.519916] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 18:59:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x486, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:20 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$EVIOCSKEYCODE(r2, 0x40084504, &(0x7f00000000c0)=[0x6, 0x6cf]) [ 1438.717221] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 18:59:20 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x11) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000140)=0x63a5b074, 0x4) setsockopt$inet6_int(r0, 0x29, 0xa5, &(0x7f0000000040)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x563, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:59:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r1) fcntl$setsig(r1, 0xa, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000040)='\x00', r5}, 0x10) recvmmsg(r3, &(0x7f0000000540)=[{{&(0x7f00000000c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private1}}}, 0x80, &(0x7f0000000040), 0x0, &(0x7f0000000140)=""/176, 0xb0}, 0x9}, {{&(0x7f0000000200)=@qipcrtr, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)=""/115, 0x73}], 0x1, &(0x7f0000000340)=""/82, 0x52}, 0x6}, {{&(0x7f00000003c0)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, &(0x7f0000000440), 0x0, &(0x7f0000000480)=""/175, 0xaf}, 0x7fff}], 0x3, 0x10020, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) 18:59:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x487, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) [ 1438.827859] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 18:59:20 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6, @rand_addr, 0xc0fe}, 0x1c) [ 1438.980159] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 18:59:20 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) r3 = inotify_init1(0x0) fcntl$setown(r3, 0x8, 0xffffffffffffffff) r4 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r4) openat$dsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp1\x00', 0x200003, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r5) r6 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r6) fcntl$getownex(r6, 0x10, &(0x7f0000000100)) fsetxattr$trusted_overlay_upper(r3, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000140)={0x0, 0xfb, 0x10a, 0xe284141cfc1ce05a, 0x1f, "49de183b72a4f709b6e141f6ce43a747", "e127df8c1e191b10d4bb637182558a12d6ff66f30a982ed7ab8991cd41823b65eddeda49c6f21998292d9546ac8a469b929957e70dd81f3c4680d9bdbff5f4c8f2d888491650987c7c85cf4001ce20be62313fca9180c0f5411d833305d8cb57149ea51da7164cd2351358509097cab08290670c8a7c530bdbc18e9d94d666e486b378727071a03955e23333267b9a48b5c73f39f650aac45dbe9a203d5d6e8d063b83c7ff747d1630ffc371057bc17c4081ce1b2b73b743b82ce0118ec24dee7d9994fdb66588c864fb074b0773a9156709fe22e6302573058c7780ea064d8c81c869a6d8693d23f4d90b17fd470144aef83b50f5"}, 0x10a, 0x3) fchmod(r3, 0x100) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x83194, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4b}, 0x8007, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="2275000048000000f3ff000000000000", 0x10) r7 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r7, 0x0, 0x30007, 0x0) [ 1439.080190] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 18:59:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x551, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1400, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) [ 1439.255791] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1439.440164] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1439.516827] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 18:59:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x277c, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:21 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x11) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_tcp_buf(r2, 0x6, 0xb, &(0x7f0000002f00)=""/82, &(0x7f0000002f80)=0x52) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000140)=0x63a5b074, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f0000000040)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x563, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmmsg(r4, &(0x7f0000002e00)=[{{&(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, r6, 0x0, 0x4, 0x3, 0x1, {0xa, 0x4e22, 0x5, @private1={0xfc, 0x1, [], 0x1}, 0xf203}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000100)="b6a8d31d58a56140c571a1585c6322a93bd0c24123afd8627d4b0e3ff1c9", 0x1e}, {&(0x7f0000000180)="11c0ee5093afa0d5888b442442a80845085f14382b106c9c90b03b6c7366d8c75af32ee169a70ad74c6fe28f507956be09c8d8cc2253ab93c5745171b90a2f8531bfcf96d1675724df727bb6989f1c4d1188a1385543d933aa663bf04f2e2f22dd8049bbd9e7ec61f8aced9b52c8ea92227a3bb06d458f3eb59e02", 0x7b}, {&(0x7f00000002c0)="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", 0xff}, {&(0x7f00000003c0)="612553d219c88f95bdd545d728f3813d8e90efa1ca3c8bad66a65b39740d7def44695b03208eb2c991aafd47f671f6cc9ad2f8195edde2f55ba6e01b0486228ee51556a567517e38324f310fc59ddbc06ece0acf3f4e58fd9e12fab307ad71af4400a074e06758d87f28d88dfb00127ba644defd6c9d04e3b03ae26d2e1085d48d751a4bc25656cdb6f1da4b06c8846122", 0x91}, {&(0x7f0000000480)="6ddb048c649930ccae45624a712088e52b33a50a30c40e23388a7bbb3d3056f7f0e010e6ec36ade55edd544fcc97f5c4c7b8da67a1b8649ca93d7dfa1a3da61b9a2b2b2fbe2220d20d9b7c69fc156316179f501ce9d92d91c3aae2ef2c1d27a462c0e9245a015e8149cfa724d5ccc0ed4ca4bcec108c4b6224702a6a593af17626c45c55090e46ffe25778b2fd5d27c108", 0x91}, {&(0x7f0000000540)="1fe15df4d8915b8e77e6a2b147f9c15c2fcd9a4d752593d34ce48ed2014a3fdaa2494132e3ee18440820c5c3ebf78f34d635dfcb0e812b03fd20e786c2f3f17e0584bd42960f971994acbfccc16d6c8f2791071181ac532f535716e3f6ea93c16d90b9435b7f3acc0a9d", 0x6a}, {&(0x7f00000005c0)="26e847c20bc42a19e8a5fd3ea475240c2aa917e25f23fcf96443ca2a67a5b72c29135c628844b6e311eb9ca305d0222a39dd99a830231bbf26541ea844a721455e", 0x41}, {&(0x7f0000000640)="a527aa9134a56d63e6c4ae9d1c4ae948d3744a0a267671d242cbbdecfe3b7dee507257e5bda933a1e59c976429ff9991adb01e1eefc722c1f432380242a41cf44913dea44ec825edc5fbba240a753f841131a6ff39939fc580c6263c9c80f5746efdff91c05e647df138f6fedba4874e3cb0902d3e0731b2d08828b7a2eae896b4f45b9e4480796a5cf2df8c7b8c4c0a1b0d07be8fbeb993edc1b1c24ea0582560bd314f13fedc83f0b0df5a7336fd3a25d8fd827878ee014c7174c0d9dfef674dabbec97e0e1fe261439aeac05e1b97f31b8ac8f5a813cc4973b4726428482adc122baa6a1488cbcadc861f850192843a163fb7f6", 0xf5}], 0x8, &(0x7f0000002fc0)=ANY=[@ANYBLOB="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"], 0x60}}, {{0x0, 0x0, &(0x7f0000001840)=[{&(0x7f0000000840)="1c2249e36393e095e54f3a3462a5e33e417ca28fb42896ddc68db86acfa2ffc1aa74af8a81a4959bb6e700ff89adbef95fd562dcfe73bdd5cd748ffa75e21718cbc8afd9b45bd318a4e8d0965b511aef5f3642bc17baaecad322b9c039825596c3aba276c226a1f7d91cd065cbd4724e23164bc5d28f1e73bfffb48138a9808fade1c2163fa8252e917af4355176bf290bf3f8a634b3cf36a864e22dcce71ea93a4184a9348b979df38b1529248c4b97ec0b25e1e9f665f92754f08a1e8ecdfad16711057fc55cd1915fe3eed44efb0a161713d46c6e8c835c33b88a0ea6759888d3379a4f3712542004ee6af486b457bbcdfc1ced341a07c6550eb81cf35a52355090e7d961d7fe5802759febfc0378f0c18facc928417db130388208d6efed65b8ed75d280e583db010aa7ba41fae57e53a850701d3bfac4b68191ac39ccdce927f723d030acc0187291834488c1bb6794ee9c9faf15f723192855a78df71a29f2d6073cdde1eb6754182d2e3781e756210f1f67fa1ca0d37ea31fa27b65a08d2a47fe955bb8d615aae84a362c051fd42d5b2c733287b2a91ec7fe505e7d7db9caad8b94f565928548bc078e8a196ebc381e0899e56af11129894f4ffd8ace0f64fa272d5b6b26d2064358d8c94c9778df86f367c35f4791ef7b7be2efd8c3ffbe2be01de023ffe8857be36721d11f039c5b02652cbd31d9219773a50ac66b4d4860dd9ef071db36e2e2e243bb4486972f3224aa69cc4e9a84cafe6fdc2a758e868a8815415aca1f59dfbbfba7fa7f5ad5a07ed0f976d615e46e4ca52eebdc45f73b0c484daab36ed4a151d03f48c84f28bbb1da892b9d9dc2b866dc2b44ddddb077522f8044fb475d4e8afb8bcc3896cb828a2fd2bba77920bee7d02ef82b5c06ac90c3fd96d288d37e2dcd6074c475ef0646715331854aa4a55d2c4e45d0e883070f88464b2b9b7ab5224f6b4eddb4fb86c54642bf39b53e09f68ae321dc195eafe02e3bdd440de18f5423c24bade55b29ccb74cce2b2586887c025859f9783bf6c69b8cf1f1c18525ccf1a119e4b7f7645f94ed17cb63cbb248ca86ca0b618746908dfcc9b0bcef4bbbfff1a2b276722a49d404ea992f266c007011b516eda834b2e9073a5dae7e739e4c6be6408da25bf6f7a1c5b7fdd8e4ed62704082539170f0b6e24d96da034f62d25985a7aa42132841635470097d8cbe442a927d19e00f9513b188839f1261a362dfa3359f6d5d417a71fef62b80e05661eb7931f08341540a155597a984c77928ca13767f04561caefff75b8909652b67993d5dec6d13d7761e1349f8db28e9e5ed09ac65d61fa6bf9e3d6e45c3cf5cb0478577cf8a02c2a2272e278dcd6c372d0bcb77fe287e16db4adbb0c3b10031cf8862d8d72d59bf286f22e3d50dd1bfa907782d27d46869f9223f9b108884752b6f1ed3ae6583f855f9809c1420d340d3e4f48644808fdf75f8eddbd9463e9ab889bfb116709957a53f2abd9f737f45cabca82ef5749b9c76494ecb4d2af9558e252fe6feb88279d71aa1ad3c79bb4b0e3390431eae93d51c731427b87176f46d99c4d3f00a20b219b33f8a53ec5fd07989b129ad4c04bafee00023086a11d1808c5532bc29f57283d43b1d4f0a3bdbfe5b6ad3069102114e81eb6a7b17d06da814a6596ebb109f6959b3662f2a5b356ab0618d85a81fed61a1bbb10bb04104152acbe75ddd284f26039984cc934ecae87c7f1c42521532955ecfa8474cb53c652637277dabb94114711d648441dfcd92444dd7c8de73cb135af56c887a6bfe0deed860b02ee4f0af454eda15c5abd3e1794cd3ce352ac93b143335da1d175d24f4c00ee5f460bd1b523dfbbd689a625c0436a50d403d50a4736a4f4328f0819d23b62169eb3b3729683b0f5172f6ebf7a70ae6dd63181667eee50478efc186d2d83ff2ca643f21d2e623d116042d75e50f4b3b451a54f4b6034c6fb1c0eccfe12f9f9fd1e2ffeec2383dafa27c095e3c66cde2d41720ec14488c39f634f89d4c3eddbd657682b8f49c18c66eca7aa3c62ebb519c81e45203bec9bce3bce9a060fc2e7b6e953d339fea255bc46d53a4e4b85f6a55bb1fa3c125f9c505aceab0b561ae70a084a62048ebf5782c0ec5de06799db62bd4c767410bcca66de96c4667d0a13a45dcb5e9e927a3ed47b06450ec179b3d36d0d5a38eedb4939de4225b1a67f01c5dd1f8cdf16a3cc10346554569ef6cbf36630b3c08f60300adbd9a6aebbfdd0ed2660066c0c657405d15e89a881550ddf5d255355968034c98d6e8215b157bb84c605c6d10e78af9254c2f956ac65f84725a44b41ac0c2fc17559ee5ffa5c162abdf72f934e0c1ece23105b78c895d95146d7e753810048bd99cd298846b4dcb9b5691f707b5f5c9b2b18007d1dc81fc6cf94c9f2b08c3d037e4bee73d8b01ab5bbc34fd0542491da8428c63291126dbc772503b139f0d2ec6d53ed33139ea1b934b2ea278fc4249cf4087e80c2035b402a295f5a133567090fd7b6df2add20b723c7431c1f571fcd1c91ed7f7c95d27e264ca178ba5d8af9d89b5797bb7fff91b5f20fca728728027ecaf0bd79a83336e72048d2bc012830db882ba6ba016e96af0a51fad255a87428c8b2cae3996a6ec453213c0b532e0bbc813f5896175010cdac3047aa842191143aaca9ba7e949ed762a9882441c64173ca953892bd54578d3185f0757bb7f65b2b8fbea364acea3e930166d9f300414d3b2a3db42aac7814fa4a7dd732056fdd088c9408e522a2fb36df8e5ecba6eb8743752e011cf4c61ab1a1e864fdadad4645aa4f688c647c6b0b0ea0151b2fadd95126d92c8b1f7bdc6611273504fb0aad0347b3afe1bbe33b43743ea0436387ec8ded427e9dd9a2b855b8a91bafac43b0aa1429baefe6e8d568f78ef8bb254b8ba697fd42544cbbd20976901b1019c1cf12d9932da2154b53a02e121a1ed772c129c646c860b23b715924c7920393e92d3968934085742be3258e72a7acbc870aed3f3fc4f73db82a22f1c3a64a37a912019ff0d249eacd2e17d52f12e3ce0fd349fc5318bc4461be5441b02be051fab6c821243f5ea0ba9840f20560a57683dff1ca3bac8441c35a34ff1dcc4df8d1afc6d3bb82c20a099d685fe0fe1bfb92ce6f2e3dfbb469e8b8c217ee070e6dfbae809a118409541a7a56034de484cf130734a5a49b7ea722738a9e5cbc23d952be24d9ff6f05dc6643c3c992378db294c7d68b8e687cab615c4ab3ff8e0cee9eafed0b0b1a8e64a9378248793558b31a9f9f2decd9d5a5a2bc15394bb38a85b97441d9291fa000b3e0d5baa090fe0c7725bc55fd21cf6b59fe3dc7ade64ebbdb8b4faa884a23a0dc64d0a3480cf91c93c0e4188360613c97f326319dc9c769d928f86cabc5a7756404cb9bbc212134003469994b70c1eb90cf2dd257a63af63ccad3f775fb5be32b91f7370dc154113d82e27edb359df54fc4ea3bc46b19199f5c92bcadc516e316267b710a70fa49a562df2f69c2e2d2c7a5ddbffa652fad1fdd6b08d8bc8043415b624a3c2fcd5fd1c643c93cced850e15bf05678b9ac7b1a3e86f359094868e5b574e1684fbc75268de8528e1a1b8df1609e3190d44ced9f9d546a84638b2f96a83bd912bb34e875e2250b0c180f547f6ae97aad66d305f96049ee96694e4200adcab55e56d3385f1a9b2b05b42f2bdd2a020cffb58bf8b97a6d6ff5deedb296ad726c77f149d698696892192623d669322d79cee7a94ccd4dd50dd373575a01f0eaa53a48ff02f57fb0e5aef00253476d7b6bb6cc3af303231e0cc6ed861d4f40fd4ffc667dbdb756911acfd6bd976484c6cec911554d3e76eb75bf60a9c9d875436cd37117a0248c8bc281a502df1d49184f1744a8a35ba6f2dff1b3bdb000df8afcd2ee232f7069c9be2184f0e201a5ad22761c81c80699e777f89b7f92e9224df5c71e30305b0bf8c2afdd4b1bb31ab492adb6388e14ed6193e55024252b59b07f3facdfdfac0ecb825638dd73e858b019d021292096f68c468f157c29ced56e275f3235f60d3e15ee8a051060b58b4c1771723025f683e48a9a0b90857f90e394348d7820c08005fbc8728a5f1ed16161fa74dfe876756473aca79add0dfb7aa6bf179ac3dc6c6bb1d7a9190a16273a2658c4cea8774758e9f54ef0c6442d282bfca4c8b218bf790b3e9648e00b7d08ab263b12593907012964f3879a0c35380ecbc22df90e128f7ee6209d31cd0eb6d1369aeaf0c91ce92788291a66d3e8d4d4604888b8e7c5403e40b3af4e8f2eb1e2931dd46fea54513fb97d782c8408ecaae3ca3dbf5ae908c2ad9690cf57d35e1260d037df8cedc8a687b6c061322e8bbf03a7ffede0f41ccb66d832ebdaf909aae45f49efad1707944ee68c2edf5aa2ec49ad70faf6dabfb91567665d75cf3bd6e10bbd402494316ee7c27df6263a6ca4572df756a3ded672a4b58981e60dd28478716b17be14ea8a6f53a220f75aba742d2f6d45caab70708bac0c1a37e766281d922d9424264af22b25fb19b7d0dc888d2bfd2db312625e9e246addf0462a17d1889d723c862f6eea1c58ef8d8de9809c7001aab2a1992a4f98c9e0cc29bef6f6651efb36e32062e24d8aaf32a7b3e11a25add0607a0288178a8c61d45f449ba09b3b8bdbf5d2072bd6c0ee8f7c6eae4910cb8bc68b6f21066714ecb14ac7a5bc49177c36465ec82347507934ab30318388705c6c08a05a4b9a95ddaa5a6da303bc4b5b84e3d40e8f149833cb65e5dc89178eca5966c539293fd88dc47c7d1908cb757794ee52a854850a5f8fc3c4f2f5213c085c2d56d14c32de2110eacd1a6a8fbc1c440572cbc2d8dab4dba68d12314841171689a740c33cd79a89b7748aa54650044c46e20f8607d5daefa61ec56a43883ad24a04c5074b86a094f3f84e0abd51f3a197ad0c6a3eb9ea7ed3ea5ea559a96e023271e7e1646b67c0eeffe3f57c588820171545d1da65c7ec36c07e1e9128fb57a295081bfb4790c66cde1cb5e8ce2517b963f7d71840d08efc7b4130695d544b450100ad74c6dc6b981794d96b69f492c7a4d4148df11111e9498377ea42258ec5b544e8c0891d77eb7c66dc7e7939694520288365f169c68f2eddeb8c653320d52214c22e5317628d4888ea5d87791ebaa67ea6a16c5c86b12760e3468ac060ada0f04ee5446222edd625d32d00b8e624c3ee980ca4105faca9d0c26a6dad1050d0d993f5b4a5ade54171618b37fe2e2e1de6375f6ba6e52ca3be28164146eefc000776ec555b9a2b7d0fc11783bccf03b8fc977541bceb01a84f7bf203f5c2881a51b1f3b0afe8416852d000616772fcccd14b838562b27b631d0362c223239087a0f1dde4adbf426ede004c355d11a2a4c02e0714ff71a2f56b48b30681478a17f22c41e63116a9145cd9ddeb89ea6ab3eb1cf664546a5518b404eb161c963bf1f46cde7ebd3ad0e04ff886d57908bf28a782636fcbc53bdc869c8a4ed9b36bdd47a30fc7c5c91b1acf6927084138f2ec4dfb931ce283c13b9199a5e94df48ddbacd5bb8e1d975e56d3ba0ab2b106cf65d4479f5e890d631f69ae43796cc1868f1f792dea4e7abd4fad8d1db5f280e46f5fee3c29801b83b1da88e0558154e35747260fed30236245ac79ad9dd63531a4548c813bd51f5f1e6220fd1fefea25e4f53f75965297b82c02df281e480b4543dd2a8ca89c467553a99b112777e12a3d801e231e0f1a26f6086363670e6a15901da8c7a8d443de07c921887707a71667ac0ba4b7b9e", 0x1000}, {&(0x7f0000000200)="0189aa6b818e4867220d62c5515010", 0xf}], 0x2}}, {{&(0x7f0000001880)=@rxrpc=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x95, 0x3, @remote, 0x200}}, 0x80, &(0x7f00000019c0)=[{&(0x7f0000001900)="348827f6aaf66931763b45ff3e046b2345c4b38b68b439639f389c2c27f788aab56050d03aa8c159961e03ad6dca006d0d1decdfc204176cc045e94c0bcd66489d9fbd8178ce2b1f1af02756a97a0cda98b3b29f240e6c7a309218e41438c1d540cac381059743bfb620de8825c73e14ac328e3046dfe73e621e339d0e36ec2e574e18f31b60614be0", 0x89}], 0x1}}, {{0x0, 0x0, &(0x7f0000002c80)=[{&(0x7f0000001a00)="198fe6d4cc52e98dc1ee7d2ef32467187e6c524c30f45a60f0074ef89ca032bbde52e2ea4ba460a7a1d16fa0e13430fc0ddd8d0b545461b5012ff214d6192cb9ba96cf22c80793023463865e17614a68d53d7ba17fabeea893d9e28d4eb1090b6774c70e27086d6cb5c7391c38065ad52e95f4b067e93dfc05dd53bc7c975d92dfe913575ebf6e0ab198006363506ffd6913619244075ae4a2510702716d9dd935f6af0231040c8078dceceb9840770f720ca65937528f0af7386b2048c72023100667616f1304e9f3952124d3050bbe878f462324379d9b3f0f4c4ab23d75d48f5a652115e5df207a847c976afe3c2481e8d3", 0xf3}, {&(0x7f0000001b00)="4cde9ba69829869f0c1d24f2335089e778c93cd7daaec1200a35eef260c234f4603083bfd13fc7f4dda33627fb58a446438fd462674ccb9fd65715a6ecbbc8aef77becea99835e322922e230ec5f0952f6bf0554264c7aff95ae79e889510649bbe840060c50e7dbc8a0a26fee8e18fdbd928195bc146e3f54796cedaafd7f0ea9c76d8f53b4a97c433b52c0ad7c21e25ba377c6989f371bcdfda1e172bdc3df4eb772d4a56229b5a07f78037b95511fcc200ef7498de5c5a2406b17fc8536943fc49db6ca165147812c005f1ebe7c090b6b7d41650b63ab5155ac38fc1258d8457b2439955f283f2951833b1bafd85d9b3dd3dc3b73413be82b35df2a9fcad73f763f7e31e9616b6c49416ec7953e73c30c2384f3a3f6ece7aabde173ab1eb50693b9642e8329cefaa3e9a09184d0a06f90c29ca3e67888ca1e6ef9a801efe806faafb3ea8c1309b3838aa4d6339bafec59992087a7ba4a618171fb2407bf6a9dd607d5715faadaf2ae3d5fbd55a3f0d67cd7bd35ff754ff4470df5bc1f82735ead99cf8d59b4a1fa33cc4ed7f5a2dfb54a98dd3035e8da785118e0cb02d082975cd369da6eb863d4889471033bc456e2821af932bcc4741d76bcf4a4fb403fc860faf185973feed109b53226248da301f48bd7d2021dac1dafc1f51086a7ba061148d1fde2a3c13e313ebf8f5ad1c6e3f613249df8af973c9265e4cd5fb633423d8edbdfade0df151d21e4e15ca3d657b7522c6ac929d97ade56e8c8ffe7cd7dbb458fa43c6b1610f8b12443e2bf229efa29da880289348c823330c4b6bc6d3caea00ee65624ee5c5978d31bbee6cf09817e2c4a558b4f2e356b5dde318ae78e870032490d47c7678573a44badef3834daaee2843380b510e0a09e22f14a04205a3ca9fdfcf452f22a6e084e6166c6023310001b59f88af810d9b90a9fa4995aa23431608e6712fc5b82053fd554c6429db1fab5556e4d114e711dc20a847f3f2388264919988d15c0e5ab82bdf8fed249f6b605f3d794683df66030a532376b6e84df8b7c7f60e86f706f713168035e7dd7e17035fd71bedf13b07d523a1f7d55cab987c6ad4f17b496e07a1f7f83535135d868c473822080351e6917f1e39bf56d1d42bc11ab057a3e75a64508f338fbfdab9a07e8bd6bbd30ad379bbb059ec233be3ab141b2860fbd4fdf9d1357ab0f8bdc8128920c199238a273e69525454800af15abc0f89970a332f21ca54ef4b10cf3d640fa2e712567e7506963f5cbed3edc65ad027a59f9813223f292b995e3f6e08f7684be706024170a3e496cc0b2e6fb8d2e63ab0d82b5afeca54f90f3f4c2bcd91bd8c8936d56a60cff40f29c4a72235a602f61fb4fae2e7366fb5bfc16e0be26bf688cd422b6a1ca053057ac6b18830fba94d2c7348bce56d284e881034bb4147456f7b2004f3b7141b4005f32e7b2502998d2f9525116ec42a91da1984efd764b3bcbc6d3a93adbbb5f47e44d42ba70a8b3448cd5b25b42f7bbf2d726cc401f60692e5ac66f4efb4eff0f0481ccfb8d3ec926eeaa7dc00808629ffcb1e7d0b7ea497e44ebf48bae96d0569439ea6a896207a7293b761aff17bdeddd98746a793f843ad7ef586b31d9ea220a3a40b02f41560b272249aaca108c01eff5c8c7deefe28ffc8c2946e8df60ce6835f2dd37b364e117e93440d5f10d52ee3ede3150197d91e179df94e1778dde18f3260cca21e2404e0711a254fc3774cd4b2cf756da1640429ceed01fbd6a1cb638bfdeba1a115bb7432b040231cb338abc6c33dc07448de3a0ee966efa6cdf8ab635ab437c86525334058f11c608f79d112c9c07bf76aa206b70142170c2e8412abf98160ed8508cab7e2bf8d4b93190da0348ae473c1b818336e301742e26605c0658bc9ec0519eca36e18064515d8cdc633d308baf8706015afa134327e0f5c76b6e9665396033dacc6faa2e1924a8ca11532efce427275f59e032f0fa58e24bb5b7268aea8ab51565ffb03acc231d07e5dbb817ffc2c857d0804686162ac423b3037820a1689fbadc09e3fc360bddf3127305c9c07e73508ca7266a17539aeeeef4dd1111160184acd1b186c6828f25e7fd4cc5505365b5ee620bb7f102620c2792a558556f39c4ce11c2b177ff00ad184f543fd882bcdc5a36424b9e8be671b8f96140b3520f9950da3bbe8b60d34d720fc61b451abfa9db128e51b9a541103487fd372072face99e37a1dccbeff22e8e5587f9bad73424d4930292c669da85e1302431a04500c518cb6855cb02aab111acc12967352ee06a8223464b18f738eb466c85ea9da5718473cbc61c97844c4e1bad2300033dc15a82a0a76fe72ea8481fce14071fddaba9bd7ede2d27fae8cd51790b945512463604daf4ad1a4ea027319813dee6c4518d889a92512dcabf36bedc19ee65494458a9fb453cb45c85d9cd50d70eab9ea6a8bbfe458f5eb0f596733624be9065af0deab9ca9d0bccfd6173fa3d07776af60b97297b8e1f82bd3068187e852fc620ab6f0237fe035f28a4f03b820f06cf01d3027509e8ccac5a20813dfd194ccef2d3152c99ca453fa593d31a95c9321d14b2f0ec5c686f06e078b611377620fe89eb8a0e43a82f7bf00a3ff6ada53f09e474f7afc5db62309dc3b1b47d0fda53ea2c0862265e766605755975264e9a7577d176e2b2b01c3bc109673dd737e144a6b3ab7ffa5a2f437dcdbf09222bcabb2080e7ce43c06d8763333c939fcc2f433bdbc100514422e85064874d8e1580f8705e3c59f0dd6ae082832ffc90943efc7402b1cb18a1ad947198ad02722d2c02003f0b9b9d9fb96561c8c99ba35974913ca9c7bb93c3a41a1c780f11eec01fe6b59a01978bfc7d7a1ab8e2e3e6699cf4630a73f89c27d04ab2e4c2723f0870cd86ceeb3272e5dd347669019c3369441f898439b3ea3397ab8b97f1925f6d21978c1dfb7194b2cc93bf7a60281fcc149103357e700c828921801ace3b782b026ddf9616a18e43a2f100e54e2d8ec972f4bd48a9b18884327db023d7bce9ae096f519de7f12823834d9701e70dc6d2493826a0b6928d06d11f7430dcd93506d4dad2de65784bea4c4dc1d355a8b3f95fff8fc3937a84ad9af37893676e43d4dcf46bf74426db53eee40a0d35a0b4b33461630281829519c4a3dbc8efb5d72e39b080f7de77d7a035e9e29d45c012756aed6c82efa2fb74be51ad8186dd92b327204aea18a5d8bbce9cd77df10ab633e2562cca650634964b1da15c5106c2cd2dfe71fb951649b9f28f7171b0ec609441b51630ba306f3732631e43c9d89adf07eab835728f3348f48d41fede2650efd2d09566d7b60ea08fc9f523649d3f97270aac9a6ef9fe2c053661e8234cc097f133194ea84e9f8192cba60110d02c958874d7bfcda39a55209cae3161d4c6366cfc4266ca81bb6d6338e16a1c7cd708ef5dfb279d12fafc1dc1982a52045f65f55ec66ceca9106b563c47f1c9f35df303446487635945f6ee28c72a47e46e1e38b72064696a7541b9f45953826bff4f38bc32e9e54442b14585bd32f6c6edc872d0742c67c8d1f6f3b3b7919667fbed208b7e44512363690c1194ea2526a9c1f6630c0bfa69ea0ba42ef15ebb7f10372c52b4691465d39f86cd90c148e1ab01c9a1f133b6adb7f75e74282e7423098c9641e411cc57c0189ca42be7df6d221f7034848fe11642d75311054110bce660c6886aa6fe53a27c2aaa72e8175af6dc8b9a152092fb11de66c81b246a524531558801f4712b347cc61934a79d544970a512091173b7e73200bc349fd3b131f7cde91a3de85f4477f112a341922c48eba9e2936997a995841d9ddc5665ca3f61d3c4f4dd0e6afcc36c6721962f58ccc0f7b09d0e48fbdd88749e5caee73182678d8a550865919e089f50f64061493e48875f5cf97c724b13c0b9c68a1c3bcdb29355bed9a4b3a31e34c5870d4a5a615bdcb04f01bee5d0fe6c74a4fc48690b76b6625a4022c5cdd8efae2c370f603244989f5545ebb97fa84352968087201fd4b24a99cfbb9e5dede131016dee96986479f2d4d3c4c7cc7e7a4a35b2b57220493fbb2ead35c9c211643a8ef64bc6e0c8c6f352dfad22f9fd99cbf6c3feda1824cb0d85aa36dcb5045de839dc00cae696e67bb8bc34e06266dfe45cfe703833415b5d478b90a6f0ebcf42bb02b6349104c8535fe1f3e6ffc441f64617eed1b37ff6568d026395c59aca8f85ffa326523094ed139d2badfc8f9f026842664bee5545cf705ab1d350fe2512dfbe73ad67ff63dfe11f9a10fef13170cb12bd38521da68286fa0c776e58d558e4189e6ba1c31159b29b82c52f095a8cb750f0984d74904137b25b04dcbf1723aefcd0b687343dd6c6c3aa981787dd4901ae930ebf6af0db794a8a2e6ac53df0858d4764e882b5367701988d85419198d2a7d5ea73c8efe84726072830d8801f246ad96f3426bc4bb729171fc5663065894a655c0e1d2b8b5c773580c270bb3a9d4fb599ebd1d6cc314c47eed403887606bdff0a478ce8da8d8503f508ff1afbcc2c6ba247a385efed3891d38e53fcc483dbcfac95679d32fa4e3596631a6eb4de5d62d5ae4f0a0b77100d75643c62e5a3e051f857b7b896e194c8501ab298c3aa0596afcc83674ed0e402991551ba59b2a37fb5a525e87e1dc97eee98f013d4c26d3f06240c0049fc1e93920b8bf6a1bf49d2cdcd75981636c1067f888b607c12e6a9cd6935352d5f70be289d414d73c2862e632e14be82ef2c554890a6d8c38962f7c14746ca5dc4f5ccd5422b8ef48aa1c915278be874002bc54babca0718a61cf2373650893eea060bd8269d5d350b7cc3e4d5ea89068bd9eed4f8b5146c9c98aa97a096ac80d14820b53915c341bb147fd56eae2c708becda95dcb54489d3f544977ec18fbdae525cd063734940be819e9bfb875ea49d130263f4f28e8bbacfa2b0756c5af002a7712f840ce66588cd277b0a695c9fb5bdfcc289b2149cb1b4bb488f4e23615316752ac6faa6f5c22a3dd9f127e0beda619b0384d4a4656c68d810ca7d89385001b06ea2daf659fca13ef2761a528d4c5fa4593cc60b7ca15270350e6262aba3527ef2ff279dd8be89229812aef4a58801540f26b2642d223633865281f4afa2794d5439c22793e636ab59eeedc94157d17d2b3e2784630d190d6ae848d5ab1f82e0e444f646ce69a6b54fbbc691c0f1350ae8974db0fc21ec235b1913b15fda3672065cc5fe261b3f976a02a17225db5b668b7a670658df0289586823d4a382247a6fe76e4e1721b9dfc8506ea9c6d3a58a8db8f3827dab97e0c2c2a7c315cda432d7da255817c6202ba0cda0e7b767483833a04f3773a53e57135cd1258debfdacc0c612382b5aa0bef2c56818b0f6671b7e19d1f663122ddc758d7707ddf77c451957719938312c157d7857a0838695a82389119fc4a75f86dd418025d99d59d508859fabbf6d035ad7ecb70944306bb299b597eb47de5538ef2b79fdc5998aaa7960d11c16c0a1fbe8bc4b0002791167e6544da6e9f1154ccf55ef37b55feb6378a724d943bcefe6dad0705f0c6c15f2796fb57269a513642e74e0f3e141af6da839e4b18372504f417fc7a6a08c3f7f02bd359977890300eea0ccff371b9830b8b6f95b90fa9827b0d44097d4cf47601629ee86e42423f10618e99d93ccef8da11b06389dfa7f7cc6bd4bbe4effbc892b8cfe81f4a070c7cc477a21b8ff97fd61497390f2981503c5b18941b17ab69379761a9c1c20af483dc45515c70343478ef1632", 0x1000}, {&(0x7f0000002b00)="0c9c7fcec2ba4f0f9d03a0bd60d5407d3dc9ad9d357b33af7c53c206f771891deda81469e2fdb979a1c6ecaaa3c6d64184bda1600185c6ab58689845c9dad620c3f2a170c28d837248e2f4", 0x4b}, {&(0x7f0000002b80)="88fa8b2b6564573501429800ac14aa7939b3017c2d9b87c74050444a04eb2a17aa62d14e53d432c026eeb18f190fd8e30e2d7ab76dd69867bf2a5be946a9e01e3c9a5e6a1d364774929d983b8d4d4d97fbe246cefdc6a1e570888c36ed04b6c68aa08030ff9b9e", 0x67}, {&(0x7f0000002c00)="02bb51c70acf09ae963acdcbaaa8ed8d7c824fedbf26a8a1dda85da6eab888561c2d5f17b149d3447eaca6db9a00d14661377d85fcc6005117d6bf9962cd3e5e5267ae7c421cdc60067a89c6e1bf97c8dc0f07283e0de3cc5738c6fcff1f95923c1aa5f63fdd3742374aa3bc18acefb632b657b67e32c56f8e2375", 0x7b}], 0x5, &(0x7f0000002d00)=[{0xf8, 0x10f, 0x5, "31b11423eb10ec37633a05b7acfbfdb3e81bca12eea20447c3de5a0e74d77a495163b1e06c8f9e5bc5d092c610f4ef3121d59430f8219ddda0cda4ffa620e8df0f4f19c36875c7e2174de998c355c961bc6c6f0cb3f1ff69d1f2f6576a4d285b59e92ecd376e06a81bfd7f67bceca94fae3b2df042f7e327c017a83a98f194890d2e38058c657cd6a298b6a9eea5203ff07d88dc0abec3e367ff209b05f74bad96f5a5d710f27b7f464701b8af2ada035368b976ce0bba5451eda7123e0c7083cc251bc916aec1b460b50696eb855f1b716808229f1e8d8fa3edbf6bb21db5db99c2"}], 0xf8}}], 0x4, 0x80c1) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:59:21 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="020000000100000000000000040000000000000008000000", @ANYRES32=r2, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r2, @ANYBLOB="1000060000001fcd20"], 0x34, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x800) setregid(r2, r3) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) [ 1439.818186] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 18:59:21 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x11) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000140)=0x63a5b074, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f0000000040)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x563, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x200000, 0x0) r2 = socket$netlink(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r2, 0x10e, 0x2, &(0x7f00000000c0)=0x12, 0x4) recvmmsg(r2, &(0x7f0000002340)=[{{&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @local}}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000380)=""/186, 0xba}, {&(0x7f0000000540)=""/224, 0xe0}, {&(0x7f0000000640)=""/106, 0x6a}], 0x3, &(0x7f00000006c0)=""/59, 0x3b}}, {{&(0x7f0000000700)=@nfc, 0x80, &(0x7f0000001ac0)=[{0x0}, {&(0x7f0000001780)=""/137, 0x89}, {&(0x7f0000001840)=""/52, 0x34}, {&(0x7f0000001880)=""/241, 0xf1}, {&(0x7f0000001980)=""/40, 0x28}, {&(0x7f00000019c0)=""/209, 0xd1}], 0x6, &(0x7f0000001b40)=""/240, 0xf0}, 0x2}, {{&(0x7f0000001c40)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000002000)=[{&(0x7f0000001cc0)=""/102, 0x66}, {&(0x7f0000001d40)=""/230, 0xe6}, {&(0x7f0000001e40)=""/51, 0x33}, {&(0x7f0000001e80)=""/93, 0x5d}, {&(0x7f0000001f00)=""/43, 0x2b}, {&(0x7f0000001f40)=""/42, 0x2a}, {&(0x7f0000001f80)=""/45, 0x2d}, {&(0x7f0000001fc0)=""/51, 0x33}], 0x8}, 0x994f}, {{&(0x7f0000002080)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000002240)=[{&(0x7f0000002100)=""/142, 0x8e}, {&(0x7f00000021c0)=""/52, 0x34}], 0x2, &(0x7f0000002280)=""/144, 0x90}, 0x800}], 0x4, 0x10002, 0x0) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0)='ethtool\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000440)={0x44, r3, 0x400, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x18, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x10, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}]}, 0x44}}, 0x0) sendmsg$ETHTOOL_MSG_WOL_GET(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, r3, 0x0, 0x70bd29, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x4041}, 0x840) sendmsg$ETHTOOL_MSG_STRSET_GET(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000002c0)={0xd4, r3, 0x20, 0x70bd2d, 0x25dfdbff, {}, [@ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_STRINGSETS={0x74, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}]}]}, @ETHTOOL_A_STRSET_STRINGSETS={0x48, 0x2, 0x0, 0x1, [{0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x10}, 0x40) 18:59:21 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6, @rand_addr, 0xfc00}, 0x1c) 18:59:21 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="2275000048000000f3ff000000000000", 0x10) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) setsockopt$inet_udp_int(r3, 0x11, 0x1, &(0x7f0000000180)=0x9, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @private0}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000040)={r6}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000080)={r6, 0xfff}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f0000000100)={r7, 0x7f}, 0x8) r8 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r8, 0x0, 0x30007, 0x0) 18:59:21 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68041) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ubi_ctrl\x00', 0x400202, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0xffffffffffff338c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$usbfs(r5, &(0x7f0000000100)=""/158, 0x9e) ioctl$USBDEVFS_CLAIMINTERFACE(r2, 0x8004550f, &(0x7f00000000c0)=0x40) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20004004, &(0x7f0000b63fe4)={0xa, 0x4e20, 0xe40000, @empty, 0x4}, 0x1c) 18:59:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x2786, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) [ 1440.236160] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 18:59:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x3100, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) [ 1440.541371] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 18:59:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$X25_QBITINCL(r1, 0x106, 0x1, &(0x7f00000005c0), &(0x7f0000000600)=0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r2) getsockopt$inet_opts(r2, 0x0, 0xd, &(0x7f0000000040)=""/49, &(0x7f0000000100)=0x31) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080)='wireguard\x00') sendmsg$WG_CMD_GET_DEVICE(r4, &(0x7f00000006c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x464, r5, 0x100, 0x70bd2d, 0x25dfdbfb, {}, [@WGDEVICE_A_PEERS={0x450, 0x8, 0x0, 0x1, [{0x1a8, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x138, 0x9, 0x0, 0x1, [{0x34, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x41}}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010102}, {0x5, 0x3, 0x3}}]}, {0x100, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010100}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x1}}]}]}, @WGPEER_A_FLAGS={0x8, 0x3, 0x5}, @WGPEER_A_FLAGS={0x8, 0x3, 0x2}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @remote}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e21, 0x693a274e, @rand_addr=' \x01\x00', 0x4}}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e20, 0x14, @dev={0xfe, 0x80, [], 0x36}, 0x74288000}}]}, {0xc, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x1ff}]}, {0x84, 0x0, 0x0, 0x1, [@WGPEER_A_FLAGS={0x8, 0x3, 0x2}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "2a4220f8dd841959121e94703a23fb43947b028ae9bae1e7ca8d416ce53889ed"}, @WGPEER_A_FLAGS={0x8, 0x3, 0x2}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x3c}, 0x7e}}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @c_g='\xf4M\xa3g\xa8\x8e\xe6VO\x02\x02\x11Eg\'\b/\\\xeb\xee\x8b\x1b\xf5\xebs74\x1bE\x9b9\"'}, @WGPEER_A_FLAGS={0x8, 0x3, 0x2}]}, {0x30, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x9}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "690a49b34a8e7b33a0f979689c222fa11e26faf5851d7213c70ef64e548bffbf"}]}, {0x1e4, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @c_g='\xf4M\xa3g\xa8\x8e\xe6VO\x02\x02\x11Eg\'\b/\\\xeb\xee\x8b\x1b\xf5\xebs74\x1bE\x9b9\"'}, @WGPEER_A_ALLOWEDIPS={0x198, 0x9, 0x0, 0x1, [{0x4}, {0xa0, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x20}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}]}, {0xa0, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @ipv4={[], [], @broadcast}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010101}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010102}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5, 0x3, 0x1}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x3}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, {0x5, 0x3, 0x1}}]}]}, @WGPEER_A_PUBLIC_KEY={0x24}]}]}]}, 0x464}, 0x1, 0x0, 0x0, 0x4000005}, 0x2) 18:59:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x3200, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef4fa203", 0x3d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="463fc6ac79a82eb78cb515942f06120402000000000000005df896677cdda39932409fa37c1164670b0cb3957364b67cce7689082b51a5b5c5a1bbda4b02e30d6e2e974bcbbae4b84de31e139687190184b1d9da2ad4fe8afbb45d5a1fde76adab04df"]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_pts(r3, 0x250880) ioctl$TCSETAF(r4, 0x5408, &(0x7f0000000100)={0xff00, 0x9, 0x81, 0x4, 0x19, "ce9f6cd7641e3893"}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @private0}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="03000000", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000040)={r6}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000000c0)={r6, 0x9, 0x8000, 0x0, 0x81, 0x7}, 0x14) 18:59:22 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r3) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000080)={0x0, 0x0}) setpgid(0x0, r5) write$binfmt_misc(r1, &(0x7f00000000c0)=ANY=[@ANYRESOCT=r1, @ANYRESDEC=r0, @ANYRES64=r1, @ANYRES32=r0, @ANYRESOCT, @ANYRESOCT=r3, @ANYRESDEC=r0, @ANYRESOCT=r5, @ANYRESDEC=r4], 0xffffffffffffffef) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, &(0x7f0000000040)="2275000048000000f3ff000000000000", 0x10) r7 = accept4(r6, 0x0, 0x0, 0x0) splice(r0, 0x0, r7, 0x0, 0x30007, 0x0) r8 = socket$inet6_dccp(0xa, 0x6, 0x0) recvmmsg(r8, &(0x7f0000004900)=[{{&(0x7f0000000180)=@ipx, 0x80, &(0x7f0000000700)=[{&(0x7f0000000200)=""/247, 0xf7}, {&(0x7f00000009c0)=""/4096, 0x1000}, {&(0x7f0000000300)=""/204, 0xcc}, {&(0x7f0000000400)=""/104, 0x68}, {&(0x7f0000000480)=""/47, 0x2f}, {&(0x7f00000004c0)=""/183, 0xb7}, {&(0x7f0000000580)=""/237, 0xed}, {&(0x7f0000000680)=""/105, 0x69}], 0x8, &(0x7f0000000780)=""/248, 0xf8}, 0x9}, {{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000880)=""/86, 0x56}, {&(0x7f00000019c0)=""/188, 0xbc}, {&(0x7f0000001a80)=""/207, 0xcf}], 0x3, &(0x7f0000001b80)=""/149, 0x95}, 0x2}, {{&(0x7f0000001c40)=@l2tp={0x2, 0x0, @multicast2}, 0x80, &(0x7f0000002000)=[{&(0x7f0000001cc0)=""/48, 0x30}, {&(0x7f0000001d00)=""/226, 0xe2}, {&(0x7f0000001e00)=""/190, 0xbe}, {&(0x7f0000001ec0)=""/110, 0x6e}, {&(0x7f0000001f40)=""/19, 0x13}, {&(0x7f0000001f80)=""/121, 0x79}], 0x6}}, {{&(0x7f0000002080)=@isdn, 0x80, &(0x7f00000021c0)=[{&(0x7f0000002100)=""/140, 0x8c}], 0x1, &(0x7f0000002200)=""/230, 0xe6}, 0x7}, {{&(0x7f0000002300)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, &(0x7f0000003540)=[{&(0x7f0000002380)=""/246, 0xf6}, {&(0x7f0000002480)=""/175, 0xaf}, {&(0x7f0000002540)=""/4096, 0x1000}], 0x3}, 0x55bc68f3}, {{&(0x7f0000003580)=@x25, 0x80, &(0x7f00000047c0)=[{&(0x7f0000003600)=""/58, 0x3a}, {&(0x7f0000003640)=""/237, 0xed}, {&(0x7f0000003740)=""/14, 0xe}, {&(0x7f0000003780)=""/27, 0x1b}, {&(0x7f00000037c0)=""/4096, 0x1000}], 0x5, &(0x7f0000004840)=""/148, 0x94}, 0xffffdb1a}], 0x6, 0x101, &(0x7f0000004a80)={0x77359400}) 18:59:22 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6, @rand_addr, 0xfe80}, 0x1c) [ 1440.873218] EXT4-fs (loop4): Unrecognized mount option "F?Ƭy¨.·Œµ”/" or missing value 18:59:22 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x11) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0x4}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000140)=0x63a5b074, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f0000000040)=0x3, 0x4) r1 = inotify_init1(0xc00) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(0xffffffffffffffff, 0x80845663, &(0x7f0000000180)) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000100)) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x563, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VT_RESIZEX(r5, 0x560a, &(0x7f00000000c0)={0x800, 0x0, 0x0, 0x1, 0x1, 0x3}) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm_plock\x00', 0x101801, 0x0) sendmsg$TIPC_CMD_SET_LINK_TOL(r6, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f0000000780)=ANY=[@ANYBLOB="58ea244b0abbd3e85096b5500d6bd63d3f6a62ded432908aa7de6faf5fef91df855bc9bdf3e159833cc52691dbd8b834cf552096e253fbea176a2047a42f7755fd068b1c2929e03bf88bf2bab5acbafd7a6aae4de6d0b45f3a58e713424c8706c5aea896027bd4eafe1cf53763bbbf54b36fddcc79c898ece4ad9f078630b82a27aff70a71dc95237cc948a486cc5b65bd000000", @ANYRES64=r6, @ANYBLOB="04002abd70fea7b00c7538c736900c7137000100e884c1bedffb078cd5909eb1f7e6ccbcdf2501000000000000c4a9d16300004c001800000023a1000030000000000000000058cb18a86a4331160000000000000000001b000000000000000000000000000000ff09001f00000061931caa4c17189f57352a344f096c27d4e792ebd278c3731e922f4036d09e2dc9a56d4b38eb7898a98483f266e737f8456799796d8fd343500aae99e09e5e368faae686d2b8010107081d16b2ab126fd969f126e4448cf994bd5de2e0707472fa8a60c205d75f3e54fe4ec756a5a94bd654c03223389ae199c63cfe458c9cdfbdbb25154b072ae6e950353f6e9fae003318fd6d5c485155a24ea42f68ccce5adc1066ce63cd689ab60eadaa119c7b1704bdf68d5e9320b20ac4"], 0x68}, 0x1, 0x0, 0x0, 0x4}, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:59:22 executing program 0: syz_open_dev$usbfs(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x400000000000006e, 0x668803) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xef4d, 0x2}, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) 18:59:22 executing program 1: r0 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x1ec9, 0x20a00) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @private0}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000040)={r2}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f00000000c0)={r2, 0x7}, &(0x7f0000000100)=0x8) r3 = socket$inet6(0xa, 0x3, 0x11) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x3c, &(0x7f0000000140)=0x63a5b074, 0x4) setsockopt$inet6_int(r3, 0x29, 0x3e, &(0x7f0000000040)=0x3, 0x4) sendmmsg(r3, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x563, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvfrom$inet6(r3, 0x0, 0x0, 0x0, 0x0, 0x0) 18:59:22 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f00000000c0)={0xd1c2, {0x6, 0x5, 0x6, 0x7, 0x0, 0x8}}) [ 1441.125741] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 18:59:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x7473a999, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:22 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f00000000c0)={0x1, 0x1e, "a302e68c2c9234837d66c6f44422afaffc39dad435488efb6a22e6e510f4"}) 18:59:23 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) 18:59:23 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) mmap$xdp(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc, 0x4000010, r4, 0x100000000) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) [ 1441.646196] EXT4-fs (loop4): Unrecognized mount option "F?Ƭy¨.·Œµ”/" or missing value 18:59:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef4fa203", 0x3d, 0x400}], 0x0, &(0x7f0000000080)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcsu\x00', 0x80000, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r2, 0x80045500, &(0x7f0000000100)) read$char_raw(r1, &(0x7f0000000400)={""/14006}, 0x3800) 18:59:23 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1000, 0x4}, 0x0, 0xf, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r1, 0xc2604110, &(0x7f0000000300)={0x1000, [[0x3, 0x973, 0x1, 0x10001, 0x0, 0x400, 0x7fffffff, 0x33], [0x2, 0x4372, 0x200, 0xfffffc01, 0x6, 0x3, 0x6f, 0x401], [0x8000, 0x1f, 0x4, 0xd92, 0x3, 0x2, 0x1, 0x1]], [], [{0x5, 0x5}, {0x80000000, 0x401, 0x1, 0x0, 0x0, 0x1}, {0x80, 0x6c0b, 0x0, 0x1}, {0x5, 0x1}, {0x7, 0xdac8, 0x1, 0x1, 0x0, 0x1}, {0x20, 0x8000, 0x1, 0x1, 0x1}, {0x5ef, 0x1, 0x0, 0x0, 0x0, 0x1}, {0x80000000, 0x8, 0x0, 0x0, 0x1}, {0x3, 0xfffff000, 0x0, 0x1, 0x1}, {0xffff8000, 0x4927, 0x0, 0x1, 0x0, 0x1}, {0x9, 0x1ff, 0x0, 0x1, 0x1}, {0xfffffffb, 0x1, 0x0, 0x1}], [], 0x3}) writev(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) r3 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@un=@abs, &(0x7f0000000180)=0x80, 0x80000) ioctl$sock_bt_cmtp_CMTPCONNDEL(r3, 0x400443c9, &(0x7f0000000580)={@any, 0x80000000}) r4 = socket$netlink(0x10, 0x3, 0xe) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r5, 0x800c6613, &(0x7f00000005c0)=@v1={0x0, @aes128, 0x2, "c65de4eb2246245b"}) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, 0x0, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8}]}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_NEW_KEY(r4, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="980000ac", @ANYRES16=r6, @ANYBLOB="00012bbd7000fddbdf250b00000005000800050000003400508005000900000000000400020004000100040002000500020005000000040006000800370002000000080037000200000010000a009690b26f2a54dab7cb95203509000700c909a7468200000011000700b98ce45b43c2f2fe7eb7d06e800000000800370000000000"], 0x98}, 0x1, 0x0, 0x0, 0x48840}, 0x20004810) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) 18:59:23 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0xff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="2275000048000000f3ff000000000000", 0x10) r3 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r3) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(r3, 0x8008f513, &(0x7f0000000000)) r4 = accept4(r2, 0x0, 0x0, 0x81800) splice(r0, 0x0, r4, 0x0, 0x30007, 0x0) [ 1441.868192] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1441.888642] EXT4-fs (loop4): Invalid log cluster size: 1946157056 18:59:23 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6, @rand_addr, 0xfec0}, 0x1c) 18:59:23 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) 18:59:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x41c1, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f00000000c0)={0x0, 0x8, 0x1, 0x9, 0x6}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @local}, &(0x7f0000000000)=0xc) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001c40)={&(0x7f00000002c0)=@newqdisc={0x3c, 0x24, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8, 0x8, 'tbf\x00'}, {0x10, 0x2, [@TCA_TBF_PRATE64={0x7}]}}]}, 0x3c}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f00000006c0)={'ip6tnl0\x00', &(0x7f0000000640)={'sit0\x00', r2, 0x2f, 0x8, 0x4, 0x7b, 0x40, @mcast2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x10, 0x7800, 0x400, 0x7}}) r4 = socket(0x10, 0x2, 0x0) r5 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r5, 0x0, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="f4ac31a6e3f69657d1280bc651c5d393832e5554fff1c01e172cd4ab9ee0fd6ce49b046dcd2b028593e81927c83005000000000000bf079bdc0b5f5b4d624ca46d96cf07e4bca522ad30df5008c51200000397edab73723353f3eac173c0b8f31c52ed24b69a911d4e1df26c11c2f728da4b5aa55b4301aeabb37bbc24d3d42d9e19"], 0x1) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @local}, &(0x7f0000000000)=0xc) sendmsg$nl_route_sched(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001c40)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000024000100000000000000000000010000bbecb290300e51ad1ba88b2b3ffbb302c1a53f4bc2c9ef1a0342c3ccbdc69859cbf94cdaa9dc2142d13ad43fa4bb1060b59a0de94cd10b765e5a8dcc615444cd1a7b453ebb7dacbe81704c6313e8438a984b30d7ac93e6a03b64295b70d7c856aaa03b7d1b3a8ec2454df7623a8e76f860e3", @ANYRES32=r6, @ANYBLOB="05000000ffffffff0000000074626600100002000c000500"/34], 0x3c}}, 0x0) sendmsg$NL80211_CMD_GET_INTERFACE(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000780)={&(0x7f0000000240)={0x58, 0x0, 0x20, 0x70bd29, 0x25dfdbff, {}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x81, 0x1}}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r3}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r6}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r2}, @NL80211_ATTR_WDEV={0xc, 0x99, {0xffff, 0x1}}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x7, 0x4}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40012}, 0x50) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) 18:59:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x7473a99f, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) [ 1442.252927] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 18:59:23 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x11) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_int(r2, 0x29, 0x3c, &(0x7f0000000140)=0x63a5b074, 0x4) setpgid(0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='attr\x00') setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000380)='wg1\x00', 0x10) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x88100, 0x0) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f00000001c0), 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000240)=ANY=[@ANYBLOB="004741000200", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) r7 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x66, &(0x7f0000000040)={r6}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f00000001c0)={0xe4, 0x8, 0x0, 0x3, 0xffffffff, 0x80000000, 0x80000001, 0x40, r6}, &(0x7f0000000200)=0x20) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f0000000040)=0x3, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f0000000480), 0x0, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockname(r0, &(0x7f0000000080)=@phonet, &(0x7f0000000100)=0x80) [ 1442.315567] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 18:59:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f00000000c0)={0x0, 0x8, "323ce1"}) syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) 18:59:24 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) [ 1442.647064] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1442.661798] EXT4-fs (loop4): Invalid log cluster size: 1946157056 18:59:24 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000040c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xfffffffffffffff7}, 0x2, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f00000001c0)={0x4, 0xef, &(0x7f0000000200)="0a6b24a471d379046793f3bd297359c897dbbc685961454fc6e9f8f2f640b778bfe8e0ada0d5d20ea463c490192651473e682d117a3b67d0d175311dc1f48f77f89bbdeb36021add53811680ace63eff10661d6c753554141e54bb628e25747af1afbd290d0b8b2679fa4129239c6723fe72f313faa1d4a61c6462a3bacbf3ffda8c92e68dbf469894073ec608b02a81bd096e8299562bef9f7d7976ae95b67189951d71a692d6e1d1e32835b04e15f9185c6c578d5fe2a5ea1ba95ca486d093c9c9bd3851195126227e86967f5a92a251c12c813824379332cf35543992c8daaf0a35af2c5e2f2c09d6ed54a87892"}) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x1c) fcntl$getflags(r1, 0xb) 18:59:24 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$tty1(0xc, 0x4, 0x2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) ioctl$NBD_SET_SIZE(r0, 0xab02, 0x5) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_FEATURES(r2, 0x8004f50c, &(0x7f0000000080)) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000040)="2275000048000000f3ff000000000000", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x30007, 0x0) 18:59:24 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x4000000080000001, 0x80000) accept4$unix(r0, &(0x7f0000000100)=@abs, &(0x7f0000000180)=0x6e, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef4fa203", 0x3d, 0x400}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="a82e5510d5"]) 18:59:24 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f00000000c0)={0x4, {{0xa, 0x4e22, 0x2508, @mcast1, 0x2}}, 0x0, 0x2, [{{0xa, 0x4e20, 0x6, @loopback, 0x800}}, {{0xa, 0x4e22, 0x6, @mcast2}}]}, 0x190) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nvram\x00', 0x6202, 0x0) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f00000002c0)=""/247) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) 18:59:24 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6, @rand_addr, 0xff00}, 0x1c) [ 1442.926524] EXT4-fs (loop4): Unrecognized mount option "¨.UÕ" or missing value [ 1443.030611] EXT4-fs (loop4): Unrecognized mount option "¨.UÕ" or missing value 18:59:24 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) writev(0xffffffffffffffff, &(0x7f0000000400)=[{0xffffffffffffffff}, {&(0x7f0000000180)="836c8adf9ebfa4fb6beb66648abe8ee566b28d76d29ab79cbebfd8507fec792ac244a7", 0x23}], 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f00000000c0)={'rose0\x00', {0x2, 0x4e24, @multicast1}}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_dev$vcsn(&(0x7f0000000240)='/dev/vcs#\x00', 0x0, 0x940) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x0, {0x2, 0x4e21, @loopback}, {0x2, 0x4e21, @broadcast}, {0x2, 0x4e24, @private=0xa010102}, 0x0, 0x0, 0x0, 0x0, 0xf801, &(0x7f0000000280)='veth1\x00', 0xfff, 0x2, 0xe1}) r4 = syz_genetlink_get_family_id$smc(&(0x7f0000000140)='SMC_PNETID\x00') sendmsg$SMC_PNETID_DEL(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="30a5eda37fab083b260e9994503a02371a42c14c9c66471e88b9c8de5d43f1bda6c1657d51037185118d62c6ebb167bbc1696dcc635bf1c085cedef0b0283f8fac7651e737e997f37ce8b1138d964e83fc3c4ebc14b38e68a1e4af2e000000000000", @ANYRES16=r4, @ANYBLOB="010028bd7000ffdbdf2503000000140002006970365f3674693000000000000000000900030073797a30000000000900030073797a3000000000"], 0x40}}, 0x8000) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, 0x0, 0x0, 0x4004004, &(0x7f0000b63fe4)={0xa, 0x2, 0x2, @rand_addr, 0xfff}, 0x1c) r5 = geteuid() ioprio_set$uid(0x0, r5, 0x2007) 18:59:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$vim2m_VIDIOC_ENUM_FRAMESIZES(r3, 0xc02c564a, &(0x7f0000000080)={0x5, 0x56595559, 0x1, @discrete={0xffffffff, 0x7}}) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x2000000000000, 0x1, &(0x7f0000000100)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef4fa203", 0x3d, 0x400}], 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="001caae58882c33a00007f2fe140176cce537217f6f3f3cd9ad913ea2d002fe130723be6b00094fbd2868aa8ffff00"/59]) 18:59:24 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0x40605346, &(0x7f00000000c0)={0x5, 0x0, {0x0, 0x0, 0x10000, 0x2, 0x1}, 0x5}) writev(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) 18:59:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x7ffffff9, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:24 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x11) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000140)=0x63a5b074, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r2, 0x28, 0x6, &(0x7f0000000100)={r3, r4/1000+10000}, 0x10) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f0000000040)=0x3, 0x4) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_G_CROP(r6, 0xc038563b, &(0x7f0000000080)={0x1, 0x0, {0x7, 0x80000001, 0x10000, 0x1f}}) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x563, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1443.295918] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1443.340248] EXT4-fs (loop4): Invalid log cluster size: 1946157056 18:59:25 executing program 0: syz_open_dev$usbfs(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0xca201) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x801, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f00000001c0)='NLBL_CALIPSO\x00') sendmsg$NLBL_CALIPSO_C_LIST(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2800000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r3, 0x10, 0x70bd2a, 0x25dfdbff, {}, [@NLBL_CALIPSO_A_DOI={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x48084}, 0x800) socket$pppoe(0x18, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$bt_hci_HCI_FILTER(r5, 0x0, 0x2, &(0x7f0000000040)={0x8, [0xfffffff7, 0x6], 0x8001}, 0x10) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) 18:59:25 executing program 4: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) setpgid(0x0, r1) ptrace$setregs(0xd, r1, 0x800000000, &(0x7f0000000080)="bee21da77030c3bf6765d0ae17198a2e5237f9e0") r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef4fa203", 0x3d, 0x400}, {&(0x7f00000000c0)="6ec07ed7e07730a10414c49f2a03dfd14eee0d56a8430f43c841fd5bdc91391fcf284c9ecf93f5c845ecfd7f7f5a7973b7d1f0598d837981a94550fc96c9a5f70f4d82542bbf06d2f07264194e", 0x4d, 0x3}], 0x0, &(0x7f0000000140)=ANY=[@ANYRESHEX=r3]) mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4) [ 1443.590815] EXT4-fs (loop4): Unrecognized mount option "0x0000000000000005" or missing value 18:59:25 executing program 2: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001180)={0x5c, r2, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x5c}}, 0x0) r3 = openat$mice(0xffffffffffffff9c, &(0x7f0000000200)='/dev/input/mice\x00', 0x100) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x68, r2, 0x2, 0x70bd26, 0x25dfdbff, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x6}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @mcast2}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x80}, @L2TP_ATTR_FD={0x8, 0x17, @udp6=r3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @mcast2}]}, 0x68}, 0x1, 0x0, 0x0, 0x80}, 0x4000001) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r5, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$inet_udplite(0x2, 0x2, 0x88) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x7, 0x0, 0x80, 0x0, 0x8, 0x1000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000080), 0xe}, 0x14042, 0xffffffff00000001, 0x1ff, 0x1, 0xd9, 0x7fffffff, 0x2}, 0xffffffffffffffff, 0x2, r8, 0x8) write$binfmt_misc(r9, &(0x7f0000000140)={'syz0', "3d2b0b537fc3e9d8e9271e119b5afb9e2fe7188fb7e04675b4559cac33a681abad42d0dac2c5a576646818b577fd7b948d82bc79563c2910454b8fd1d2c59fccdf5648304309eb31628a258091ad5d48e668f2f4427cec0de434f7c448a595b7009674"}, 0x67) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, &(0x7f0000000040)="2275000048000000f3ff000000000000", 0x10) r10 = accept4(r6, 0x0, 0x0, 0x0) splice(r4, 0x0, r10, 0x0, 0x30007, 0x0) [ 1443.705123] EXT4-fs (loop4): Unrecognized mount option "0x0000000000000005" or missing value 18:59:25 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x6c041) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280), &(0x7f00000002c0)=0x4) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x8000000, 0x4) writev(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080)=0xfffffffe, 0x4) r3 = socket$inet_udplite(0x2, 0x2, 0x88) get_mempolicy(&(0x7f0000000180), &(0x7f00000001c0), 0xea9c, &(0x7f0000ffe000/0x2000)=nil, 0x4) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000100), &(0x7f0000000140)=0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000b63fe4)={0xa, 0x2, 0x6, @rand_addr, 0x1}, 0x1c) 18:59:25 executing program 4: lstat(&(0x7f0000000100)='./file0/../file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000040)='./file0\x00', r0, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x6, &(0x7f0000000440)=[{&(0x7f0000000140)="c4ced342ec6f94c9bdbd13dd9454e87f45f9739f21b8a34c82cfa5155da2327ec7bb48c3e2bd759798506339cdfbd42b93c293247c880cff5b338d6d5455729f81978eff8ab9cf766935a080b8b77bcf58ddfd4f38e481c9b5da3663437abd493dcb77783a6f01568448a845a0467a2cfc48a516603fb02adadc50010772a01dc68a6f766eb2066fc74ca7daa41d70", 0x8f, 0xffffffffffff75d2}, {&(0x7f0000000240)="634f5b3d40a5fa57bdcf73d67b97c8d6a44aa07d045f9e8841fa083c61c7467d14a777188cceb16da58ddafcb06ce77bfe7816ae61720c05fe4205ea14dcf32e19e727d0f3067ede5a1d5cc1bf2511", 0x4f, 0x2}, {&(0x7f00000002c0), 0x0, 0x8}, {&(0x7f0000000300)="f07761b5f69e78a272f85f3b654002a1aae5aca151", 0x15, 0x2}, {&(0x7f0000000380)="29743bbccdcfd4d83ab907289d1d926c4cee6eba934f1713efe5711afadffe6c54d45a886219e3a126882b03eb231db2e360a4345c33e5b3507db15b8c6c7815a75dfa", 0x43, 0x3ff}, {&(0x7f0000000400)="abeef6dd183e7fa66a2dd39c01", 0xd, 0x8}], 0x7800, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'cp865'}}, {@rodir='rodir'}], [{@subj_user={'subj_user', 0x3d, 'ext2\x00'}}, {@smackfsdef={'smackfsdef', 0x3d, 'ext2\x00'}}, {@smackfsdef={'smackfsdef', 0x3d, '%,+--\\'}}, {@euid_gt={'euid>', 0xee00}}, {@euid_gt={'euid>', r0}}, {@fsname={'fsname', 0x3d, ')'}}]}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$NBD_CLEAR_SOCK(r2, 0xab04) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef4fa203", 0x3d, 0x400}], 0x0, &(0x7f0000000080)) 18:59:25 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6, @rand_addr, 0xff0f}, 0x1c) 18:59:25 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6, @rand_addr, 0x1}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mISDNtimer\x00', 0x48141, 0x0) dup(r1) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f00000000c0)=ANY=[@ANYBLOB="0200ac7eb629ad8a29d966ec6a59cf10633b94607d9dfbc0d68962b12576284d5dbaec78068a3c30c4085fd9d1c7a2e0840dd5176e816e5d4e5afb1253560cf84dee6c258cb6aa66e0b82f9ee5e693ba24ce551f99d49e8a2b000000000000a7121b335d8940656c3ec9b7b692dce261b2bfe48612792e905bd2290265abccd8f9ad6a4f05876dc5d3262c21f3b388a5a2be0c15671f39a88b7b1172def7ed49c362bca102872a6e922a5777b5e796be"]) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @private0}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000040)={r4}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f00000001c0)={r4, 0xb855}, &(0x7f0000000200)=0x8) socket$inet6_dccp(0xa, 0x6, 0x0) 18:59:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$FBIOPUT_CON2FBMAP(r1, 0x4610, &(0x7f00000000c0)={0x36, 0x2}) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef4fa203", 0x3d, 0x400}], 0x0, &(0x7f0000000080)) [ 1444.119072] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1444.130283] EXT4-fs (loop4): Invalid log cluster size: 1946157056 [ 1444.216370] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1444.223995] EXT4-fs (loop4): Invalid log cluster size: 1946157056 18:59:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0xffffff1f, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r1, 0xc0305302, &(0x7f00000000c0)={0x1ff, 0x1ff, 0xfff, 0x7f, 0x1226, 0x8}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) read$alg(r1, &(0x7f00000000c0), 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef4fa203", 0x3d, 0x400}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="01"]) 18:59:25 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x11) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000140)=0x63a5b074, 0x4) setsockopt$inet6_int(r0, 0x29, 0xd1, &(0x7f0000000040)=0x5, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000080)={@mcast1, @empty, @mcast2, 0x9, 0xe8, 0x4, 0x0, 0x2, 0x200020}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r4, 0x84, 0x21, &(0x7f0000000100)=0x1f, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x563, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1444.321499] EXT4-fs (loop4): Unrecognized mount option "" or missing value 18:59:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SOUND_PCM_READ_CHANNELS(r1, 0x80045006, &(0x7f00000001c0)) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734ffffffff612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206c12a51c4aa0dbdb1dbeb322c7184d4", 0x3d, 0x400}], 0x0, &(0x7f0000000080)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000180)='nl80211\x00') lsetxattr$trusted_overlay_redirect(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000100)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file1\x00', 0x8, 0x1) [ 1444.515062] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 18:59:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_int(r1, 0x0, 0x16, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @private0}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r5 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r5) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f00000003c0)=""/91, &(0x7f0000000440)=0x5b) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000040)={r4}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000380)=r4, 0x4) r6 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_GETPROPERTY(r6, 0xc04064aa, &(0x7f0000000300)={&(0x7f0000000240)=[0x0], &(0x7f0000000280)=[{}, {}, {}], 0x9, 0x0, [], 0x1, 0xa00c3f7bd744d45}) sendto$inet(r0, &(0x7f0000000140)="04df9fe0abd93916a858b2b6ceb40fc5ad06b2c8f626833c25e656386e1269d18d9e7121c23d25525e9d4e2a73ebb134a5d3baa5e558f9b5a6628ca506eb1b14a4a4fdc9578314622c01da22bc8ea9185b3e72d859ece3eafdcdbb2fd38f0321a2b192c1e17a5f6b1326ceef2da5012b65fade4ce6d006183a62a2ab70859033a6fd7c1483972eb949225c44bff888e15a2563291dcc254d468c088647490e", 0x9f, 0x24040081, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef4fa203", 0x3d, 0x400}], 0x0, &(0x7f0000000080)) r7 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vga_arbiter\x00', 0x416201, 0x0) ioctl$FBIOGET_FSCREENINFO(r7, 0x4602, &(0x7f00000004c0)) 18:59:26 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) r3 = syz_open_dev$vcsu(&(0x7f0000000080)='/dev/vcsu#\x00', 0x9f8, 0x20502) connect$l2tp(r3, &(0x7f00000000c0)={0x2, 0x0, @remote, 0x3}, 0x10) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x200000}, 0x0, 0x2, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x80}, 0x0, 0xffffffffffffffff, r5, 0x8) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="2275000048000000f3ff000000000000", 0x10) r6 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r6, 0x0, 0x30007, 0x0) [ 1444.796288] IPVS: length: 91 != 8 [ 1444.817337] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1444.833759] EXT4-fs (loop4): Invalid log cluster size: 1946157056 18:59:26 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_inet_tcp_SIOCOUTQNSD(r2, 0x894b, &(0x7f00000000c0)) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000100)=""/214) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r4, 0x111, 0x4, 0x0, 0x4) 18:59:26 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6, @rand_addr, 0x50000}, 0x1c) 18:59:26 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000380)='/dev/audio#\x00', 0x3, 0xa0080) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f00000003c0), &(0x7f0000000400)=0xe) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcsa\x00', 0x101000, 0x0) write$6lowpan_enable(r2, &(0x7f0000000340)='0', 0x1) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000100)={0x1, 0x0, @pic={0x1, 0x20, 0x3f, 0x7, 0xfa, 0x7f, 0xb1, 0x80, 0x7, 0x77, 0x0, 0x31, 0x0, 0x3, 0x3, 0x9}}) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6, @rand_addr, 0x7}, 0x1c) 18:59:26 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x9}, 0x0, 0x3}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$IMGETCOUNT(r2, 0x80044943, &(0x7f0000000000)) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) 18:59:26 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x11) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000140)=0x63a5b074, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x10, 0x3, 0x0) r4 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r4, 0x0, 0x8, &(0x7f0000000840)=ANY=[@ANYRESDEC, @ANYBLOB="80637fa031be7ba4db35c3b41d42a8a58473b063660950c68e529d85c78222a8b7b7722d06356a1304ec632007b6123d7308f1639066fc9359c3f8f1052640fd26806da33ff033487b5addbf5bf92efd8b47cb4ce31439004b75efacf8f3c8409b62e4cdead5972d1f0f047c317b1b5a45839b8682362dd91ba6f93a25459dc4", @ANYRES64=r3, @ANYRES32, @ANYRESOCT=r0, @ANYRESOCT], 0x1) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @local}, &(0x7f0000000000)=0xc) sendmsg$nl_route_sched(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001c40)={&(0x7f0000000640)=@newqdisc={0x48, 0x24, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {0x9}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_prio={{0x9, 0x1, 'prio\x00'}, {0x18, 0x2, {0x3, "8c0c8a5c739c57745e24801858ee563d"}}}]}, 0x48}}, 0x20000004) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000600)={0x1f, 0x4}, 0x6) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000580), &(0x7f00000005c0)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000540)={@empty, 0x4e, r5}) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f0000000040)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x563, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) r6 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvme-fabrics\x00', 0x800, 0x0) execveat(r6, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000300)=[&(0x7f0000000100)='\\}#@/\'-\\\x00', &(0x7f0000000180)='$\x00', &(0x7f00000001c0)='\\T@[:\x00', &(0x7f0000000200)='%@*.[\x00', &(0x7f00000002c0)='\x00'], &(0x7f0000000500)=[&(0x7f0000000340)='*\x00', &(0x7f0000000380)='-\xd5&\x00', &(0x7f00000003c0)='\x90X!\x00', &(0x7f0000000400)='\x00', &(0x7f0000000440)='-.\x00', &(0x7f0000000480)='-\x00', &(0x7f00000004c0)='\x00'], 0x1000) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:59:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0xffff8880973c9d58, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:26 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x1, 0x2, 0x2, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}}, 0x0, 0x200000000000000, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0004000000000000000005800000180001801400020073797a5f74756e00000000e5ffffffff17000380100003800c000180080001000000000004000100"], 0x44}}, 0x0) sendmsg$ETHTOOL_MSG_WOL_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x70bd29, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x4041}, 0x840) sendmsg$ETHTOOL_MSG_WOL_GET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x110100}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0xac, 0x0, 0x0, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x4}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0xac}, 0x1, 0x0, 0x0, 0xb865cc03e2032d45}, 0x4000) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x0, 0x3}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCSETSW2(r3, 0x402c542c, &(0x7f00000000c0)={0x80000001, 0x81, 0xffff8001, 0x6, 0x0, "7e47515846d328838f507e5098d01c11c5aa99", 0x9, 0x2}) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) 18:59:27 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) syz_genetlink_get_family_id$mptcp(&(0x7f0000000140)='mptcp_pm\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000880)=ANY=[@ANYBLOB="7f454c46aa201f7f040000000000000002000300400000008c0200003800000036000000010000000000200001000300001000000000000006000000070000000200000004000000f32e00000300000000000100040000004959970ea496869105f83a98b15c31f16e88c79ff5fa6fc89cec000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000bf000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000029b6021ccd88630b0b70c5ec781092e977302db8be19d030f891543adf379d27260605410dbfc7eef0b6bdce9dcdd727664614d98e9e11458f3b184d8b68ac1b995da185d32ea833ed3e46ed2224f85f236fa0471786f00b9d1904cf65a3d56e0df974c81f720270de2cf566ca3b6ed4dd360a85ec9a58828a1030ee306cc835e424c6bf6e8cc75fc9b7016736f21e67495d7f49f7f9f0de290af7f576185e8c474e17b7c19f3e83c4"], 0x672) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) openat$vcs(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vcs\x00', 0x20000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000000c0), &(0x7f0000000100)=0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) [ 1445.527854] IPVS: length: 91 != 8 18:59:27 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="2275000048000000f3ff000000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$RNDGETENTCNT(r5, 0x80045200, &(0x7f0000000080)) 18:59:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file1\x00', 0x7ff, 0x4, &(0x7f0000001380)=[{&(0x7f0000000000)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef4fa203", 0x3d, 0x400}, {&(0x7f0000000100)="0614bad52b6c018ca66deae4d39566502cf14461221deba1635a00f7359afc1e6f563edaece856f58d36902ebd8f3d1d077d8e676f41a17d0183effbbc9ecea3b420f186ab04ac661eea0a895dc5153b20053bf6a2083b78831aaa9b66c302abd5f7c563002a1c248ad69c6759f4d68050b5f1e98141ec838711a40c77307a167899e8de9b7f98318d9a1292fd55c0efe469c5e67b754882752afde0a799ec4b27d32bb26cf3d58f4cfa030a2a76c078a8561e074749c6351af9921420d048fc1c8ff68204683c458f92acde7bf8118b39c40c3687d4debe5391131dd4e2e35519b5f0bd42", 0x144, 0x2000007}, {&(0x7f0000000240)="0a4dc20cba8f44f0c009f428695ab515ba8a245cb16e2ef3e36a83fea67f06b4b5a1db835f02a6db21319119d7d4a1a26fc77e61305a4bd483f7eb73caf749c330962d5f58f5f84925f0d011196f310105aade4e2ee93723d16c8ab062811c48cb9bf1e70ab71e1bcd16162257c76cf3f329302a9c4aad8e11d9daee608c2073a3a0dd8ef1965a1bedd7eb0e49f2748e2a4a315b82c3a4ec68c4", 0x9a, 0x8}, {&(0x7f0000000380)="cc41605d42d2115b07932325e90c93a99c699c68378597cd0f10163d245d7b08166e78210ad82deaadfae712ed703229de2c6ba94b2dee4c03c562a0d198e6791abbc26efaec19a979962138858ebafe9b7cde1d673fdc228aedde55bf67899dad1641782f73420831a888555eb790cb5a8bd9eb1241b74995b4a0ee945f15ef66211eab6e15a9213949a18b39a76b6daea2622731f38fc2a2a7ee7b57fc37578836d0d0f2c3bf584c4111b4cf51fe0b2486286b225416a5e89411608a506c16d2c44495b279c8d39618e1d1e8f13980f7fbc48d4a88cfa3bd8f41ab4088597a5d1ce0acd0acfd7b3e496084550ea0be4ce42f70470444cd7845d920321d676839d9102a132e09413d7a40aa05af850785ed32e709477f7879f19eac82ae21cfc9a2a5920b3fc0105129bbb2a4e85f27de0d33db2135f5517584974e6ce146b379941e542a8c1971d315696e180212fdf1b4a3a00979844b3613a8b336da4faae20542c499dd885f98b4ebbefd5853d4c48141f3e52249d2542bab937fd4770873b0aae1325b07ec638f47b40e64a7110cf618a1afd651eeb0ccf5800632b8f6a772af98af05d14e1633ba0b5039e08d703e268d1250e34a275fadacbf1c140ac5b4cb192b2c493e0f424a261b1574c8c840f238781cfcc77a161f95878acdbcdffaa2a0ae7b19e97a9130e41a0707bbabb767b52fc7977046359323b5ec3b001641dd789637d456e6e776da26ddfcb596221034fc7fb8b9a4be978975a1a06c113d0c4eb5205da1cf415e92a0acdf4c6b145033a3e41aaf70de4a2e5544c5ee1874684fc8f920039a67f82578b613a2353d390abdeec810c3815f7b257cd3df3e5212e6721bd48cde5a3891c0c983eb147f6d7a4931aa976faff20f1b78616a433ca24ccb120cf6cd3b3d9803b2fd5635de5af50e21a70bb2c62f184cf5ddc2cdce64128dc980ca84d1047a0ec1305473859017d88b285b3bf4897973d9d78da3b1b65500555914f2b0b50b644fe86e969ea0dd5ae275dff3af31de863105dbeae6eb614d213d36101ba1593df2f77b5f4121d3933e3ebb90680c88e1525f90f17b875978ee20e3b257ea6275b4f760863ead00ccacdcbceaf748012b92f3ce79dbb8c2adc5534fd28590807bae219868d6ca56d684c41b3011ec9e1af9263c684cc020dfa05f59f8d0629f3cf60212d247e4af530dc6994874882a43e01f4c7b46684c39c630058a032b652aab8359cc71391c2df1934e7e7d07bb40e2984d8eb91178ba0941fcc12a6196f87b9f3f777718c482c163827a648aa97a4a6577eb5333858227927b211c34471a5ff2cf77706e6d8b1214b7de2c853a555d6b1359b5492af460eac00f26b386d2c6ae9c0ee5a59c774927ae409e4335dfdb585b1f4080d33961cfd86e3a6440422d4311d103879b389f10ee02069ba78bf5e99fee0ed9d0d9658c55ef4b745dc1c1dfcfcf170899a95b3947435f04a97f89bfbd155258d82c16ebecff341e6316a05bbc0f6c1331dfa98ccd65f11b170a496b01920a7778d2ef6d3eac60f607a622b4d2f3cf01f0e77611a68f8bf3178b77f61854b0c07be62763ac81bf4fae073f95b56f8b7a64ccf180d4c4228da106ca179596d8bfee3d8a93638fdd0fa8671f2e0462deecb55cd4b8b1da0b58b7dabe69b7b3dfc6e1bda2c5fee9738902608eec9bb4245ef0734b3855fd80975ac4ee3e31218956e189609ef31217be4604d8497f92c62f935c9ff85a6f0136cfff3430f1d8b13171ae8440f4ea7e3747e7dd328d3a7a368ef4e06d829f9e53b1361ff010df35151564b96a95c00780aa68bb495c247f25b25c01c0c74978c5e736994f8281866d08ef02702cf8f96a68f867f8555cb530b2bba1f5de9b3012a4951b7c46a2fbcd60531ddf9de9064a580a01c4ca42b4de0ab710abfea7b9e9d75906b3a54d7b297adf085ac3fe79ed68cb83d87d5701b08d27c3e34da4cac07b41fb0e0f91274d27291f40525a54a208502863806b602f967301a5c3747c7b2aa18e5c975022ffcc55bc2eb1823cab95adddd03cff988f19ee843c0d72729ecce280da67e11c7197b6a351c25929e5c10647470ba25aa584d31dae1c711ad2fe289d26d738a43ee99d9d9bba84d0982e4a9e73a868f176b4321107ba597428b2924d551ee06dffb8b6875c8e9ed3e66d1028ee67814da3a127797048c24541d508d4cfa2126eaa191246c2d0edfdff98aee5355e682722e55216b1b1ca3b2e4a4450c21795dc8969138b7a6418ff7154d2d82c4d492a960500630be1a384aed54df3a1b3d81c85b76f43669a491c16aa9839d582bd5514d2d6184f9e2202226df28a40edcfafdadca312afe281c32dd71b9cb81d7ca4582cd1b6eca644756bac51bb29f58be2d90186e03f52246a83224c566050665213e7436762bd3c7654370da3f524edbf1376405131bdcdc121a60c783549f35c813d88377815e5e7cbec8c1ddddde36249e20f66803dfa80c2391e57a188b625599bbe564f75c5dd8772edb45627882ed33356f710f12ee27789407ee809433e5e7203eedd590f352eaa5c4e5910f1d72f2c01c56d835f808b46ae51536169410106b80aa031d223ccfeccdfd60e0f9a98d06a930b9b2f0183152877defd91cc6b7e4a810d19026bb0a774c2e80c835f3ffbbe6af8cbe9242f1791974fc533fdcee1b9300ab0130f044d44e8bc57082b5e03d5474447978d6b1bd4eae09ca20061957e99f14b139367c3f297e35b194905ab49b054d5ac8ecd75ae16856caa69ed901231dfe70b0d42dd2800fcadcb8fcdf2ef9d2a60372adf20bae5204d269d4d3b3a239fd6878d3c62a21a88c7714083ab5cc98ad26987ef1b14ef9e483e13f8bce4b42af5b976aa64c77aeef2aab6f1af58ed07d2b27172354fbdf156c01748c2b892058263ccaf59091be6ca26b4d6141655b13783f5f734f2a359fc6a975b024aafe2de9d317eb4e3d4298b06a82b9fa454c425026a52169d3f883fff854ecbe2714d640f58b315637d96be6b90842105a610acede8d9c0cf632a695a270067752fb2ba112bf937eb603a6134dd17e1277b00f8ad13a7b2327946247e2a10b11a87f80f83c6d8b06c970276782c697521f8fd094a84e83a9b1fe52c85af4f050f5592f75a5b641b694fca5e892f215dd378cc280322b8db16fe82ba03e062a40b3e3c4d635a97d1aafad2f0fd007af04ee9062099b56458ff5a38046bca6d5461496fce48d53441d73de5292a18147f9c23074e5f3d98f7bb28ca5544be9d3416bbaa444806a87fd845e2de16d48e8814e950d2448472bbd23f65d926a8f25e4c8f6a961e4ee18452cf813d5fb47a6b69caeddc5f5f6b9c0b845ce0b05f43eaf5f3c98a028add3fcbf466106ed3b9a5c3f2627c4786e1f4944b87d9fdc9038810e3001fe21c92350f29731c418953012de3b2123a9d71a8883fc2a3a336e3d0ebc8add21c79127392098755be17fa7a442622281107dc00284a949442e3aab3f72e12ff75fa2b5dfd842c698cc5ab0e6f08217b1b8a73f6b2b915fd5c5810db8dde28e037076ffcc3d3568ae561e438eb4f86d4dbcf756bbc8a9775f05f95f98a3f3519b4017857f0e2b5514e7075b705b51f1c5d154ae2585daa8f9318a826b07b0b135ca21ac1f7b7d596e412b08cd2401ce16e27266265f993087c630fc8acb3c0d86081e714d65b06d61aaa534f28d662d31e0e69f673f017c05057705e2093bfa75309c43217f9760796a20e9cd7fdc57cfc75c02dfdbd4b2628b6957138c875c548f6e0ea0f7a15ad8ed3de1addc21a8314d95184d96926deb39d8c9eb010c25044b951547cb2cbc84bcfd58824b0edb03d6e90afb31a4887db0de2ddeb928a3180c41c3f7ebe09ff25c605af5a07db00e84ebbfbc027ee86908c2c213e22c233a615c15e57ed1b4adb733938568ed6d5f3debaa17609f7d4b5f613febfe45f0a9ab480e203be0110a15ad5b7f287497f9d9d3b1477d60f3b019d76840d98ad7a77c131b43222bb33beb5757c9e7da40f35157d31c07a72d87647b6bbcb0e8d803b05f8d15d37ea9108f7545eb2b2d4598ec5dae66f0e5f71a088ffb49897a4aaa852504134591a42d865d70d8227e21fe4eb017f5ae14ebbc533d7245882410e82a4f59872e09c61fab63fa95b889bba4abbb2b32974543b5580322aaa475939d1f65da3535aa685922d08f5689eed21b0af565dd9d9937b288fb9cb7bed3bf03a1aae5ba4192bb75a94b2a5cf4d0ed2b862b9b18a059806c9294f16935b26bd1c7a84ca2534442f10e48d5a04f135fdd018bd4a9e1a90be80bf4325000361f24e05524daafd5fb6ecb0705725e20d701276b4a82c985343f44b0dcce60487be7ac9fa3898a33f9b00adace68d2e13c804ebb8e46d4720188bce90035bc75edc17a51140041604573a5a80a20b52e2694fb171b55cf5acdaf09ef0de9de7cc885b061ccbc82460ade2163f046ab7b302c0f334a89fdee8ad5a818b88898d3a3ec1ffadf837307733ce75c0a9657463af35a9075a9206e819c40a7eeb5c1b61fc3b31d0880e304a6ee6a8cf5a000c1b77483becd1946b1af7dd038b28892845402b74e26d5750e0291e362c90c841693766fb47ac19ef40536df006ea6e451357c9984cc82ba0b226d9a7442cd8aede3b976dff5d344b13f7cd9c823e6ac64179b7226c3afc69e3dc8d564767d6eeb39e61dfb50567f3853ac4ce8d5ce9af138d352fb532663598790af9fb68d4c1046f0c36c4bb608629cf272dceea084f61badec5490fd18892fb8bc506e691319c52bbd1478749fcebba4d4e5940866a5d7d1dcf9375745d054d34c655e365e7666a25961a94a1d85f614b599b4c9c17322bc4f1a867ca5b12a662d0fe2a052d9c70533e306e73a909ee7b84318cb8f3f49fb52e7b65917c97f1101868309e3075efc116173f976da2ebf7e55d68f1a5b7c3c9987d202aaeadf25db4100d506b47292c2cf43d4ea50ca55df55b84120950ecdb5b93ba8cb5503b0aac9962730aff5e137b4b763c80dc08a70bd1ee7431e7b031f51153b7dad0a624d692eadc57e8f2280d7f46138fe50b6c4722c35511deeeb9103a591f92aadfcf76745da9f882cbefeee04038ff3c61a259108ec3fb7e21ea9101e9efa4b639b3b587d2dc3e4d32d29b0fe829614712bbcfea07eaf224eb580d1ff185a8b3d76abea57e2293da6ff3d278c00dc7a1f99842933ce7eca5e13320cfb337e073600ff83f287bb0e036167cd515aeeb739e75f2d359f2640ab415657f358477014449fc263cde9b5c445127e3d85a3e57889001f606176bb9d0f5dee1e064f71b850136e9c720a4a777b7fe401cff135c0874e93c999b8ba90928d9252b6ec6d9da1b1d9fc0f876b98596e3b526c175ce15468898f67dd4063b8fe30359a687efc2b17665d2fa8fa930ec1ec6a5bed2d2aea9b0fe1b13229713670b7ad697f3b9034298d8ea04bf4945e900bc534960e518d0d560e3a2bd4f4b643cb60ce0ea251508e686e93ca236158ee9ee3534039c83d635f3f1991db704543fd60c510d3ed5690237c0f59e9086ca0d1386e50ae377a6f81a8f2e36210f9ea905dff6a540abf394ab67fdec5cb217f8db303a61b09b8edde34877dc6abefc608ca79e40e6ff637cd9658b8eb6c5865cedc83270324f92a33dada63b187a14e59c5736608b8c4ee6e45ced7ed5df67107282b8c45967de9c8386df52d06b695f650b7711babfd9721442c737fbfd48594798d477b4555e4da957b3ed166eb4124847a35967de", 0x1000, 0x800}], 0x0, &(0x7f0000000200)={[], [{@fowner_eq={'fowner', 0x3d, 0xee01}}]}) [ 1445.660891] EXT4-fs (loop4): Unrecognized mount option "fowner=00000000000000060929" or missing value 18:59:27 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0)='mptcp_pm\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xe2, 0x9}, 0x12812, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x10) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x10000}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, 0x0, 0x29, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bind$rose(r4, &(0x7f0000000180)=@full={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x6, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x40) 18:59:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef4fa203", 0x3d, 0x3f}], 0x0, &(0x7f00000000c0)) 18:59:27 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0x4, &(0x7f00000000c0)=0xca99, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) 18:59:27 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6, @rand_addr, 0x1000000}, 0x1c) [ 1445.961850] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1446.044074] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 18:59:27 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @private0}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000040)={r4}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f00000000c0)={r4, @in={{0x2, 0x4e21, @broadcast}}, [0x100000000, 0x1f, 0x1, 0x1, 0x8, 0x3, 0xe09, 0x80, 0x6, 0x7ff, 0x3, 0x80000001, 0x3c, 0x7fffffff, 0x5]}, &(0x7f00000001c0)=0x100) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) 18:59:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef4fa203", 0x3d, 0x400}], 0x0, &(0x7f0000000080)) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x24a100, 0x0) 18:59:27 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x11) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000140)=0x63a5b074, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f0000000040)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240), 0x0, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:59:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0xffff88809ab29118, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) [ 1446.232228] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1446.281710] EXT4-fs (loop4): Invalid log cluster size: 1946157056 [ 1446.365480] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1446.372997] EXT4-fs (loop4): Invalid log cluster size: 1946157056 18:59:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef4fa203", 0x3d, 0x7fffffff}], 0x4000, &(0x7f0000000080)) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, &(0x7f00000000c0)=""/155, &(0x7f0000000180)=0x9b) 18:59:28 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$binfmt_elf64(r3, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x7fe) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r5 = perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x41c1, 0x2100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000008c0), 0x5}, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000900)="2275000048000000f3ff000000000000", 0x10) r6 = accept4(r4, 0x0, 0x0, 0x0) setpgid(0x0, 0x0) r7 = socket$inet_udplite(0x2, 0x2, 0x88) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = inotify_init1(0x0) fcntl$setown(r9, 0x8, 0xffffffffffffffff) fcntl$getownex(r5, 0x10, &(0x7f00000009c0)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r8, &(0x7f0000000880)={r0, r9, 0x3dcf}) splice(r0, 0x0, r6, 0x0, 0x30007, 0x0) 18:59:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef4fa203", 0x3d, 0x404}, {&(0x7f0000000180)="83c457af7a0ed3a54e7271e5489c0d37225f4081ab0c4c8ca5aa1fd75924cfe222cc49936009ff36c4a9632c25685f1ec4ff36bf89e6e83f7514f6eaaf2fb2adcb06a6d1eb1163c78fcc10d6bcfae1f7e024b6d1a2e0c3b9a632888892e3ce741d91d6fffc20290b7009853e04b17539199f5358da3064749d6586b68f567db534985e1562adda430856a47dbfd7afe2785d60b5a8f3ddac46ca095a7a7b7fa44387accf8ac4543f87d145fc78e2b45371588333f2e19577eb8cab1ddd55395a43f576ca4c1b19774a5359b192fea8ba874efef882d7fb664db48acb2803480fca8aec5f119a929c30314e16ce", 0xed, 0x7}], 0x0, &(0x7f00000000c0)) [ 1446.576416] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 18:59:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef4fa203", 0x3d, 0x400}], 0x0, &(0x7f0000000080)) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x404d80, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r2, 0x0, 0x8, &(0x7f0000000300)=ANY=[@ANYBLOB="d2"], 0x1) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @local}, &(0x7f0000000000)=0xc) sendmsg$nl_route_sched(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001c40)={&(0x7f00000002c0)=@newqdisc={0x3c, 0x24, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8, 0x8, 'tbf\x00'}, {0x10, 0x2, [@TCA_TBF_PRATE64={0x7}]}}]}, 0x3c}}, 0x0) sendmsg$xdp(r0, &(0x7f0000000380)={&(0x7f0000000100)={0x2c, 0x2, r3, 0x7}, 0x10, &(0x7f0000000300)=[{&(0x7f0000000140)="02d3cb467f78bcc35f7dc2ab78f6d118da12e5e16ce2bdc22c94f0aa729ea7c57258ead803f975f50e244dce07c3163f2f3353544ff30680c34603887f1c697c5f0f1cc43a456ce1cc366011cdd34c673918c87edc4d1f2da27fa384054d800dbf59de5047f2ee70b1ce7749a35ce966da220d11557f6748aff4229d913f751ad5fb600dcadd79839a780cc7f3a3b6865b32affe04e8784a1b9cd3883502f6464c4bbb7d215178d2fd5a03f154", 0xad}, {&(0x7f0000000240)="d47535c4dfc9131459dbd8e2d30237a970f615c79e0fb76dbd44a05c7395eac32249230aaa6968fa6be1ce1e112a3a2c2aea7a8fbd92c7c9ba32f85020a1ee7ed83c5c9ad2fcc36a59d100cce6fc71070d2265004788a70a821d3dbd52b31f9b4bf659d520faabd7d99d416e01b99d90439ade0169b59a6afae342214cec5e9d45bbf75e3119db2a869868e81b96df289c3ea9a2c34b81b4a1e0039098ee2094277d", 0xa2}], 0x2, 0x0, 0x0, 0x1}, 0x0) 18:59:28 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6, @rand_addr, 0x2000000}, 0x1c) [ 1446.820402] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1446.843994] EXT4-fs (loop4): Invalid log cluster size: 1946157056 [ 1446.917930] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1446.944054] EXT4-fs (loop4): Invalid log cluster size: 1946157056 18:59:28 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f00000000c0)=@usbdevfs_disconnect={0xccd}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) 18:59:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef4fa203", 0x3d, 0x400}], 0x0, &(0x7f0000000080)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r1, 0xc058534f, &(0x7f00000000c0)={{0x6a, 0x6}, 0x1, 0x10001, 0xe0e, {0x3f, 0xdb}, 0x3, 0x20}) 18:59:28 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x11) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000140)=0x63a5b074, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f0000000040)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x563, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fchmodat(r2, &(0x7f00000000c0)='./file0\x00', 0x32) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsa\x00', 0x8040, 0x0) mmap$usbfs(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0xc, 0x10, r3, 0x1) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:59:28 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_netdev_private(r3, 0x89fa, &(0x7f0000000140)="43d3975b6f887a71aad275b43ef8e42b18669c607b1d684c26dd2eaa27f201ad2dcc5775e33dcf4be28d71a1f008704409f2e0397bcca543e59da755d3c1d7017a7b322a7b9aee804a2353eaae086c2ffbaaf4e3c64c9651522ab83011346bf25df3702a886bef33a1df9a70e7f5b1ed04eaa0262f249ea93bd27e7c09dfad2ae1f073dbfe4a1663c74594414dbef77b8a8884b7698b572b") ioctl$VHOST_SET_VRING_BASE(r1, 0x4008af12, &(0x7f0000000100)={0x2, 0x7}) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) [ 1447.139234] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 18:59:28 executing program 1: kexec_load(0xdc, 0x6, &(0x7f00000004c0)=[{&(0x7f0000000180)="0c2dcd63230a62a964b0faf319f68eb665e247613c127c95ba4824ff14b2470111858eea3516271bd125abb49c5a2653a8490b8833406e83563a55e0a6c224d21d538acd489144180a758b83eab55c2d8850527026c6d06a22c8381b00e2174e7bae656805894e2f145e1e2600090960349ff93efbecb8de0b94372d48370cbcde03d01599d7b6f9edd06e723fec98b4420c87ebfca6788c6b2b4ed435", 0x9d, 0x1, 0x5}, {&(0x7f0000000100), 0x0, 0x7, 0x6}, {&(0x7f00000002c0)="c05dd0f6dfba42e0", 0x8, 0x7, 0x2}, {&(0x7f0000000300)="d3a3274ebfc300feaf", 0x9, 0xfffffffffffffffd, 0x8}, {&(0x7f0000000340)="ca2f9c3e39e492360cb9199c4537f2ec4b437799bb29ebeed419c902c6662e7692cc9aee304953071990ce06a3e65cf52707f79988390ddcf974fcdf8809719fb434570363b87333d71db65600b937", 0x4f, 0x3, 0xff}, {&(0x7f00000003c0)="706a16a4144ac81c98239922866f6b22be5fba66a4f01bf7c3336e99c673406049c7d97f61f7e777f96f52733edb194c1dbce3a43a6eaadc6970d3221fd38a5fd76b2d42625596e6c0d7f1976b8136a812ffd00035a45f385fdae639fd83a31aa3acc573daa07d1142b25d378a03b280237437a89d4de146db2bb868f728dad49d247f4c2b1df7da403a2aa09a61fb65ff1faa928007122fdc867bb50a272df909325b6c908a21b5f45eb7a97b13881ab552e20fece61c6f4ae207cb9ca8f5117d62d3205edef76874b91257ba73", 0xce, 0xfffffffffffffffa, 0x8001}], 0x320000) r0 = socket$inet6(0xa, 0x3, 0x11) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000140)=0x63a5b074, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f0000000040)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x563, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$cgroup_ro(r2, &(0x7f0000000080)='freezer.state\x00', 0x0, 0x0) ioctl$TIOCSISO7816(r3, 0xc0285443, &(0x7f00000000c0)={0x800, 0x9, 0xfffffffe, 0xec, 0x5}) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:59:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) [ 1447.188273] EXT4-fs (loop4): Invalid log cluster size: 1946157056 [ 1447.261340] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1447.272818] EXT4-fs (loop4): Invalid log cluster size: 1946157056 18:59:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0xaaaaaaaaaaaabbf, &(0x7f0000000080), 0x0, &(0x7f0000000080)) 18:59:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @private0}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000040)={r3}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000080)={r3, 0x80000000}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000100)={r4, @in6={{0xa, 0x4e23, 0x170a9c36, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x100}}, 0x1ff, 0xff7f, 0xfffffff7, 0x1000, 0x4}, 0x9c) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r6, &(0x7f0000000140)=ANY=[], 0x4240a2a0) prctl$PR_MCE_KILL(0x21, 0x0, 0x1) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r7, 0x117, 0x1, &(0x7f0000000040)="2275000048000000f3ff000000000000", 0x10) r8 = accept4(r7, 0x0, 0x0, 0x0) splice(r5, 0x0, r8, 0x0, 0x30007, 0x0) 18:59:29 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @private0}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000040)={r5}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000180)={r5, 0x10000}, &(0x7f00000001c0)=0x8) accept$ax25(r2, &(0x7f00000000c0)={{0x3, @default}, [@null, @null, @remote, @netrom, @bcast, @rose, @remote, @bcast]}, &(0x7f0000000140)=0x48) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) prctl$PR_GET_FP_MODE(0x2e) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) 18:59:29 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6, @rand_addr, 0x3000000}, 0x1c) 18:59:29 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x15) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000140)=0x63a5b074, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$CAN_RAW_LOOPBACK(r2, 0x65, 0x3, &(0x7f0000000080), &(0x7f00000000c0)=0x4) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f0000000040)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2ef}}, {{0x0, 0x563, &(0x7f0000000040), 0x361, &(0x7f00000002c0)=ANY=[@ANYBLOB="00000000000000000600000008000000ae51506c8c4da917864b4f27ba025b35fd8f2a77ce9b3860eb217f6d145adca6345152e26eb4ab050495af78ffe26d70c8c1874e22aa5fd456a721314bca693adee8287d49172e1bc3873d7011c2655a9ecc056a21c9e49ad1185b55bccb1811d6d7a97588c63e0881da13c57c5c2cfe19ec960400000000ad544a5e8e6ca22da017ac340a4a91da9e87b48c85cdbdb537c8d84933860acd38bdb72ecba9184db4a22211c0348d22d4332dd8a88489035405314c2c3c7c63099daa5934bcf1baaef9b92a12f934e8258394ff4d1a9383ce1fe3a34800"/242]}}], 0x40007aa, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:59:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="05bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:29 executing program 4: r0 = inotify_init1(0x800) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r0, 0xf507, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef4fa203", 0x3d, 0x400}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="9111bc9b963e2b0c000000008a65e89adc804791c0895321eb37a94751d16842ef5e822ce9ff03321d1709218a21238f981cd89176179c5c9a6246fae66f0c377e80cd24f3a386222663c7866f2dc22c6e97a63fc1eb385a9a49a0ff2b4c0283dcfa3f8aea7ca5"]) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r1) pwritev(r1, &(0x7f00000001c0)=[{&(0x7f00000000c0)="2dcda53ef005a19ba66e77d8c1c272c615e951f4e0483f6176", 0x19}, {&(0x7f0000000100)="58445cf87beda3a4cb85fc742ff223cf8c47847d333a1d2e557f837638d4751fe3aa4e752afe8d49afc9d3634cadebbef9ec2ffe4127400b2d193ad03d57fa643ac8a2454046dd4a97946529f83269b2d991c9670116bc47682b51bba7c1165ed8b3173e4a516422fa39e7a63f0df9638d11ae8a0c77658040d32f301931b22f2e69243df39e137eaf26eeffc990465a4f3a6028", 0x94}], 0x2, 0x100, 0x9) [ 1448.262456] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1448.287802] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:29 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r2, 0x0, 0x83, &(0x7f0000000240)={'filter\x00', 0x0, 0x5, 0xd5, [], 0x7, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {}], &(0x7f0000000140)=""/213}, &(0x7f00000002c0)=0x78) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$CHAR_RAW_HDIO_GETGEO(r4, 0x301, &(0x7f0000000300)) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000000040)="2275000048000000f3ff000000000000", 0x10) r6 = accept4(r5, 0x0, 0x0, 0x0) splice(r0, 0x0, r6, 0x0, 0x30007, 0x0) 18:59:29 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x2, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x10, 0xffffffffffffffff, 0x2) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) 18:59:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="45bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:30 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) r1 = semget$private(0x0, 0x4000000009, 0x0) semop(r1, &(0x7f0000000380)=[{0x4, 0xffff}, {}], 0x2) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SG_EMULATED_HOST(r5, 0x2203, &(0x7f0000000140)) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000100)={0x1, 0xaa, 0x20, 0x8000, 0x612}, 0x14) semop(r1, &(0x7f0000000180)=[{0x4, 0x7}], 0x1) semop(r1, &(0x7f00000000c0)=[{0x2, 0xfff8, 0x1000}, {0x2, 0x1, 0x1000}, {0x3, 0x0, 0x400}, {0x4, 0x1, 0x1000}, {0x0, 0x1f, 0x1000}, {0x4, 0xffff, 0x1000}, {0x0, 0x7, 0x1800}, {0x2, 0x9, 0x1000}, {0x4, 0x6}, {0x4, 0xf97a, 0x1800}], 0xa) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) [ 1448.446294] EXT4-fs (loop4): Unrecognized mount option "‘¼›–>+ " or missing value 18:59:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef4fa203", 0x3d, 0x400}], 0x0, &(0x7f0000000080)) [ 1448.519526] EXT4-fs (loop4): Unrecognized mount option "‘¼›–>+ " or missing value [ 1448.528907] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1448.540797] EXT4-fs (loop3): Invalid log cluster size: 1946157056 [ 1448.621112] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1448.633872] EXT4-fs (loop3): Invalid log cluster size: 1946157056 [ 1448.643207] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1448.663018] EXT4-fs (loop4): Invalid log cluster size: 1946157056 18:59:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="53bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef4fa203", 0x3d, 0x400}], 0x0, &(0x7f0000000080)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x3c, r2, 0x100, 0x70bd2b, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRET={0xc, 0x4, [0x2, 0x6]}, @SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xff}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20008000}, 0x48005) 18:59:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x8, 0x9, &(0x7f0000000800)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef4fa203", 0x3d, 0x400}, {&(0x7f0000000080)="c15909f0b43389b68cf80a62937b8295f8896c01a01cc4e00abdf9686f3025d62f7a9023c4cffd3db6dc50caeb484f44416e02f9e57903cf384323a31f9453df3a200dcbc2142b7f02cbd6042e45adac07b0f1d80835544901d6f4dfd45c288ba74880b4a6410f4e21b41f9ab9b75243a9fba7053e69a88062e3af0672f3bc3dcc1c7c547de4fbc886509ae1bb0b2f163f5516a4d46422072b85d233d8dd628fbca773d0ce", 0xa5, 0x2}, {&(0x7f0000000140)="2fe275fe2fa89bf9ee85d0d374e4e46b05602abcee28f33b05", 0x19, 0x4}, {&(0x7f0000000500)="ae54c0cea230025efee24942e0140e404f5cfbc981967f22b1ad20cf41c034f359a2b10a52625bd6fad61435b459d77654ff0549b6a4f9c373669c05e973a1fa2d037eb13ca52573b7757af284780a0b75e0fbd1d875f6bccf7f26491e981a24aaf6ba09448b5e8663ac0f4914d83e6eaaa0a8d9f32d", 0x76, 0x3}, {&(0x7f0000000240)="28a4e76ec256145d2b8430dbd0992b0aec0bd03b7d79bfacd792aa02b569131ff31601617b5165fda1f9b2d3c20e25d551ad9b", 0x33, 0x8}, {&(0x7f0000000280)="99aa886f5729b39003170c212801d7ee065412001e6aaef2f1d88999455402e07466dc6f8790aa44e33680afecc6fc17eaaa43fb351c6ebb9585573f917d59443380f8b161d4f783e5fcd7c11d84c05ce1d167234bc1bb6a9bf3e5dbda5674c371a511aec132195c04944021cf58353b824be020de50f174a28aff7390a60db064960e8c38ee503b5f5d9154a47106262dae8a4dd7801bf4982d2f24ff57f3bd69da3afc12560b00016cb5304b67a36f03", 0xb1, 0x8}, {&(0x7f0000000380)="34a1312077b0369b194713b4eaee0df50a27505fe3c45d2c1f1e38c704e7de184f1ef767176d671c396365872524154e9e4bbd12724918d933c6c69673d1185b8632875181e08ec4bd82d000c501261c98e3a61b91d3a1769612ae57a79b4d57af976bec5c480fa3b01b809203ea41b221378636a0f546dbe9aabb25715e848918405f0c573546b1be2cb9911cea3c08754cd89ae8", 0x95, 0xfffffffffffffffe}, {&(0x7f0000000440)="4483fdf5d9b8148e390115d9c5cc30aa9c5b9d", 0x13, 0x5}, {&(0x7f0000000480)="1898d6c718da46054c34e2f7cfde76cc0609acfcd82041080ba38500fda33941069fe966e2011dd2bc41c0884e42cd65422b1f7ae445ce0891a2ededfec6305952bc4c237cdc27654b505e687fb1e1e7c620b0f0d6ac218aeceed7533b72da0b0c95ef5c496943c58449092c", 0x6c, 0x5}], 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="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"]) [ 1448.794839] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1448.803238] EXT4-fs (loop4): Invalid log cluster size: 1946157056 18:59:30 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6, @rand_addr, 0x4000000}, 0x1c) [ 1448.898584] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1448.928608] EXT4-fs (loop3): Invalid log cluster size: 1946157056 [ 1449.013438] EXT4-fs (loop4): Unrecognized mount option "‘‡¸ãÄÉ8| 4xý¼ÅUù¸œä_" or missing value 18:59:30 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x11) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000140)=0x63a5b074, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$unix(r2, &(0x7f0000000080)=@abs={0x0, 0x0, 0x4e24}, 0x6e) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f0000000040)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x563, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:59:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca20a769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef4fa203", 0x3d, 0x400}], 0x0, &(0x7f0000000080)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_DIRTYFB(r1, 0xc01864b1, &(0x7f0000000100)={0xfffffffc, 0x1, 0x1ff, 0x4, &(0x7f00000000c0)=[{0x7, 0x100, 0x7}, {0x8, 0x6, 0x9, 0x3f}, {0x2, 0x6, 0x400, 0x8}, {0x100, 0x5, 0x1ff, 0xff}]}) [ 1449.149419] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1449.158552] EXT4-fs (loop3): Invalid log cluster size: 1946157056 [ 1449.200546] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1449.223715] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1449.227535] EXT4-fs (loop4): Invalid log cluster size: 1946157056 18:59:30 executing program 1: sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f00000002c0)={0x43c, 0x3f4, 0x200, 0x70bd27, 0x25dfdbfd, {0x10, 0x2, 0x2f, [0x80, 0x8000, 0xffffff5d, 0x3, 0x80000000, 0x76, 0xff, 0x80000001, 0x8, 0x4, 0x1, 0x7, 0x5, 0xfffffffd, 0x2, 0x5, 0x3ff, 0x9, 0x40, 0x200, 0xeab, 0x4, 0xd5e, 0x80000001, 0x2, 0x3, 0xffff, 0x1060000, 0xca4, 0x855, 0x0, 0x4, 0x1, 0x89, 0x25, 0x20, 0x9, 0x3c, 0x8, 0x7, 0xd5, 0x81, 0x9d5a, 0xe034, 0x93ab, 0x10b9, 0xffc000, 0x0, 0x101, 0x9, 0x8, 0x6c0b, 0x6, 0x7, 0x6, 0x40, 0x7, 0xffff, 0x2, 0x80000000, 0x3f, 0x1, 0x2, 0x5], [0xf217, 0x9, 0x7, 0x0, 0x7, 0xc0000000, 0x8, 0xfffffffb, 0x3f, 0x9, 0x3, 0x3, 0x6, 0x5, 0x0, 0x7, 0x10001, 0x7fffffff, 0x6bf9, 0x6, 0x0, 0xc4, 0x17, 0x1, 0x3, 0x81e, 0x9, 0x0, 0x20, 0x7fff, 0x200, 0x2, 0x8, 0x917, 0x8001, 0x9, 0x1, 0xfff, 0xd4a5, 0x100, 0x5, 0x82, 0x1, 0x5e60, 0x3, 0x80000001, 0x3, 0x3, 0x401, 0x200, 0x400, 0x309, 0x8, 0x5, 0x80000000, 0x7, 0x7, 0x369, 0xf66, 0x800000, 0x5, 0x1ff, 0x9, 0x1], [0x3ff, 0x1, 0x3, 0x5, 0xcd1, 0x2, 0x81, 0xf684, 0x0, 0x0, 0x40, 0x3ff, 0x20, 0x37, 0x3, 0x9, 0x0, 0x4, 0x3, 0x6, 0x5dc4, 0x9, 0x2, 0x6, 0x80000001, 0x6, 0x1, 0x9, 0x81, 0x7fff, 0x3f, 0xffffffff, 0xd5, 0x3, 0x9, 0xf0, 0x7ff, 0x9, 0x0, 0xffff, 0x5, 0x80000001, 0xd70, 0x1, 0xffff, 0x597, 0x401, 0x0, 0x2, 0x62, 0x7, 0x2, 0xaa, 0x7, 0xfb, 0x6, 0xba, 0x7, 0x6, 0xf31e, 0x0, 0xe1c, 0x10001, 0x10001], [0x6, 0xcb, 0x142, 0xffff7fff, 0x1, 0x7, 0x2, 0x7ff, 0x400, 0xffff2069, 0x4, 0x80000001, 0x0, 0x9e, 0x2, 0x200, 0x8000, 0x40, 0x5, 0x0, 0x2, 0x1, 0x6, 0x1, 0x9, 0xfffffff8, 0x1000, 0x7, 0x3, 0x1, 0x4, 0x4, 0x9, 0x0, 0x8, 0x90, 0x4, 0x6, 0x9, 0xfffffffe, 0x0, 0x9, 0x9, 0xfffffffa, 0xed3, 0x5, 0x40, 0xfffffffe, 0x0, 0x7fff, 0x71c, 0x2, 0x8000, 0x0, 0x1, 0x7fffffff, 0xfffffffc, 0x40, 0x60000000, 0x3, 0x1f, 0x8, 0x8, 0x20], 0x19, ['([.+\'g).!\x00', '\'\x00', '^$\x00', '(\x00', '!\x00', '$+#{\x17\x00']}, ["", "", ""]}, 0x43c}, 0x1, 0x0, 0x0, 0x20000000}, 0x4008841) r0 = socket$inet6(0xa, 0x3, 0x11) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000140)=0x63a5b074, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f0000000040)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x563, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_int(r2, 0x29, 0x4c, &(0x7f0000000080)=0x4, 0x4) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:59:30 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) ioctl$BLKROTATIONAL(r0, 0x127e, &(0x7f0000000100)) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="2275000048000000f3ff000000000000", 0x10) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet6_buf(r5, 0x29, 0x2e, &(0x7f00000009c0)=""/4096, &(0x7f0000000080)=0x1000) r6 = accept4(r2, 0x0, 0x0, 0x0) ioctl$FS_IOC_SETVERSION(r3, 0x40087602, &(0x7f00000000c0)=0x4) splice(r0, 0x0, r6, 0x0, 0x30007, 0x0) [ 1449.251141] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca222769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:30 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r1, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_GET_DEVICE_ATTR(r4, 0x4018aee2, &(0x7f0000000100)={0x0, 0x3, 0x100000000, &(0x7f00000000c0)=0x9}) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) [ 1449.419608] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem 18:59:31 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) 18:59:31 executing program 4: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) setpgid(0x0, r1) r2 = syz_open_procfs(r1, &(0x7f0000000040)='uid_map\x00') r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000380)='batadv\x00') r4 = socket(0x10, 0x3, 0x0) r5 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r5, 0x0, 0x8, &(0x7f0000000300)=ANY=[@ANYBLOB="d2"], 0x1) getsockopt$TIPC_IMPORTANCE(r4, 0x10f, 0x7f, &(0x7f0000000280), &(0x7f00000003c0)=0x4) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @local}, &(0x7f0000000000)=0xc) sendmsg$nl_route_sched(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001c40)={&(0x7f00000002c0)=@newqdisc={0x3c, 0x24, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8, 0x8, 'tbf\x00'}, {0x10, 0x2, [@TCA_TBF_PRATE64={0x7}]}}]}, 0x3c}}, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r2, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, r3, 0x2, 0x70bd28, 0x25dfdbfb, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x5}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r6}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x9b8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x20004010) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef4fa203", 0x3d, 0x400}], 0x1004, &(0x7f0000000080)) [ 1449.461856] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca225769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:31 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) chdir(&(0x7f0000000140)='./file0\x00') r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x0) [ 1449.659833] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1449.682677] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:31 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6, @rand_addr, 0x5000000}, 0x1c) 18:59:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef4fa203", 0x3d, 0x400}], 0x0, &(0x7f0000000080)) [ 1449.773422] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1449.803227] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca22c769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:31 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/nf_conntrack\x00') preadv(r0, &(0x7f0000000100)=[{&(0x7f0000000640)=""/4083, 0xff3}], 0x1, 0x0, 0x0) [ 1449.915679] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1449.937918] EXT4-fs (loop4): Invalid log cluster size: 1946157056 [ 1450.024056] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1450.028204] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1450.033508] EXT4-fs (loop3): Invalid log cluster size: 1946157056 [ 1450.047490] EXT4-fs (loop4): Invalid log cluster size: 1946157056 [ 1450.108719] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1450.122064] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:31 executing program 0: mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="2400000032000903000000000034500a01594800000000000000100001000c00010008008708911e264f9bc4ccf6572a7fb7e8ee92c31868d6fe3a7fa70444ccce6ff95d7bb782ede5d4e1e52e48ee596b66d783071741d2cce388c42ff6e1b5baeeb39f153c08be0000a8b765affd26a906cd006ac5aacc66a49d314afde2"], 0x24}}, 0x0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000100)=@get={0x1, &(0x7f0000000080)=""/63, 0x82}) dup(0xffffffffffffffff) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:59:31 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x11) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000140)=0x63a5b074, 0x4) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm-control\x00', 0x7810c1, 0x0) getsockname$netrom(r1, &(0x7f0000000340)={{0x3, @null}, [@default, @remote, @bcast, @netrom, @remote, @rose, @bcast, @rose]}, &(0x7f00000003c0)=0x48) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f0000000040)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x563, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000080)=@assoc_value={0x0}, &(0x7f00000000c0)=0x8) r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r7, 0x84, 0x6e, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @private0}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f00000002c0)=ANY=[@ANYBLOB="357402dbd4cffe", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x66, &(0x7f0000000040)={r8}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r3, 0x84, 0xe, &(0x7f0000000180)={r6, 0x7, 0x2, 0xc7c0, 0x1, 0x4, 0x7, 0x0, {r8, @in6={{0xa, 0x4e24, 0x51a, @private0, 0x9}}, 0x9, 0x8, 0x20, 0x4, 0x4}}, &(0x7f0000000100)=0xb0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:59:31 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x0, 0x3, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="2275000048000000f3ff000000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0x0) 18:59:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca2740a9e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) [ 1450.310916] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1450.334339] tc_dump_action: action bad kind [ 1450.335356] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem 18:59:31 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x40800, 0x0) r1 = shmat(0x0, &(0x7f0000fea000/0x3000)=nil, 0x5000) shmdt(r1) shmdt(r1) ioctl$FBIOPAN_DISPLAY(r0, 0x4606, &(0x7f00000000c0)={0x1000, 0x960, 0x780, 0x320, 0x3, 0x3df6f353, 0x8, 0x2, {0xffffffff, 0x7fff}, {0x7, 0x5}, {0x2, 0x6}, {0x10000, 0x7f, 0x1}, 0x2, 0x100, 0xc6, 0x7ff, 0x0, 0x0, 0x4, 0x7, 0x7, 0x10001, 0x0, 0x1ff, 0x5, 0xdf6d8b488bc92476, 0x3, 0x7}) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef4fa203", 0x3d, 0x400}], 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"]) [ 1450.367597] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274259e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) [ 1450.516990] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1450.525475] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1450.525687] EXT4-fs (loop3): Invalid log cluster size: 1946157056 [ 1450.549169] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1450.549537] EXT4-fs (loop4): Invalid log cluster size: 1946157056 [ 1450.563406] tc_dump_action: action bad kind 18:59:32 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000002c0)=[{&(0x7f00000003c0)="05da27b2866df3704971c98c292cd2f33a02e0dd46b2a3f67a9d0399366aa9a7d617c43db12217a0ba6d17843f28d2cfc8b0ee0d2babe5225d50c3aaef0822eb4706a8796a84392ca4c110e9413ceebe4d0f0bd5dc84d15aaab65e1e949b0ad1ee9da2d8b80dfbc1f0e48bfc0b1ae9aa192d870a6968ccac5c8ec56acd1ce8f120947b910ab92f4956182f95c78c71d4c599245835234c34bc0e77e697370abba6252f69e660ef4f75f19cf798034523b880858644ed3a89fa259d34238ce9cfae2afd8a8623754118609458aa262e54ffd511c455c871fe19faa6ef5e38f86e3ae1dbab1a8c175bc409", 0xea}], 0x1) 18:59:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e0a0a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) [ 1450.637132] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1450.648104] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:32 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6, @rand_addr, 0x6000000}, 0x1c) 18:59:32 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x240, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000100)={0x8, 0x7fff, 0xffffff01, 0x2, 0x81, 0x84a}) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef4fa203", 0x3d, 0x400}], 0x0, &(0x7f0000000080)) 18:59:32 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000280), 0x0, 0xfffffffffffffffc) bind$inet6(r0, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) [ 1450.744600] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1450.760157] EXT4-fs (loop3): Invalid log cluster size: 1946157056 [ 1450.823189] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1450.827358] QAT: Invalid ioctl [ 1450.834137] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1450.851453] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e250a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) [ 1450.909144] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1450.937707] EXT4-fs (loop4): Invalid log cluster size: 1946157056 [ 1450.990754] QAT: Invalid ioctl [ 1451.000367] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1451.013123] EXT4-fs (loop4): Invalid log cluster size: 1946157056 [ 1451.022827] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1451.036214] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:32 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="2275000048000000f3ff000000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r5, 0x80184153, &(0x7f0000000400)={0x0, &(0x7f00000003c0)=[&(0x7f0000000080)="6d4aa9a28ee4e32ad07cfc3ff3f4dd60606fb14f2da42462ce7aa218df7142522c6918e3a19a44128f2d3eda81dc7a5b7db1ca009482c99ce37f3a0697fd4bd91f391a64509220d3da7d35b8b6075358d75c29be018fc885a5ce49c7e1bd2cd8b558bffd5b01c28a7c97f62f0000cf2a1441d74d24d517e31f3839bc66a879ca86740971b40f25d96d3d0dc82bf81e11027c88777e2e76fa18a4e0cb8160000e7b838247fe676729fe4f99d278ce60e6a3b4630d68aba42ba1671d0a470f3da511c22586edbeb6523bb1898f1af1aef8", &(0x7f00000009c0)="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", &(0x7f0000000180)="4d8c08e495d733ca013ebb14", &(0x7f00000001c0)="24e2a5b5170dc94265b443a1b94802c2eae1af4ea8f31a7bc712dca2078e0ab800ac18e60bcd718f5cfa587aa19093d2e92cd275967d0d29a0ddc999120b1c905af3a43ab570c2f0d5ec2efccdc8c8d3badb75e6246ab885360a5a4ae463b2caa8b4453b4c45d537d0f35074441265b1ad2558492506369375abdb25036c8557e0366a73883aafb63189fbbe1490a1db605f29021af7d75cd0e98933a92fc44ca503849d2dfd48c47a9518f363bacbebee0e12779208b6", &(0x7f0000000280)="6bb934f7e8faad9ad2db50930e005b0f3122ae5c5c67e5053d7ca989a6b4d2d30708e480b7380dab31a715d67d3276d039b6de3db0d9b08d1aeae60f6ae74eeaba6fd7112055208c86b71353fb6ccd3578a1fa1795eb338061bc00e2efeafb31a1d4cca66eb5390667ab7deb1eaf25fd997ccb5333e211ea065003cddc825af9d3b3e2883ec89f4fe81b259600397de7fbd875c5a6e087e415f947df0fca5789ed1e9699c59ab11dd97d30f76369ea958c09", &(0x7f0000000340)="ca6ad9dc23799e062258c65a07904c59b2b906b49854d5c0e3b3a833744eeeee93ef8862acf5facc26765b661dc3a57bfe4496fdf22dde90f661aca22bddefbe196b0c238ffd36c77d6716fb6740365845961743660f9076d3678e66a9e544a0662504e9991d85301f795fdd9a"]}) splice(r0, 0x0, r3, 0x0, 0x30007, 0x0) 18:59:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef4fa203", 0x3d, 0x400}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='\x00']) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file1\x00'}, 0x10) prctl$PR_GET_FPEMU(0x9, &(0x7f00000000c0)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000180)={0x1, 0x8000}, 0x8) [ 1451.182791] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1451.190797] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:32 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x11) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) clone(0x40848080, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000140)=0x63a5b074, 0x4) setsockopt$inet6_buf(r0, 0x29, 0x1b, &(0x7f00000002c0)="54e940bf022361a0d7f8244b02a03cb9d20fdb44ebdcdcdd1720a2d696dc8c930dcdce4036bbcc4d4dd3b5c5e78cb073a49f7710514e78810e0cc883e49d3118d326d3e58d4d231be27b1b24a78f5775a74d10cc80f53049cbb69ea4dc644f9eb4df94e04e3c0b1083091e41fa9da2c27eac8b0c8971ec9fdf258b213b84b9cfac7a161fecd28a51d6bbb5d38b681196a4a7da610cf73f7f114ddcd7b8ab33d795ecda9ba5dc5d71d22cac448c851a7dd339109bb93e4f164b51a185f050eea57b707f00060209e75d2322b976", 0xcd) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f0000000040)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x563, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) recvfrom$inet6(r4, 0x0, 0x0, 0x40012002, 0x0, 0x0) 18:59:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e62032734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) [ 1451.314141] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1451.336175] EXT4-fs (loop4): Invalid log cluster size: 1946157056 [ 1451.343038] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1451.381782] EXT4-fs (loop3): Invalid log cluster size: 1946157056 [ 1451.427428] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1451.433210] IPVS: ftp: loaded support on port[0] = 21 [ 1451.435200] EXT4-fs (loop4): Invalid log cluster size: 1946157056 18:59:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef4fa203", 0x3d, 0x400}], 0x0, &(0x7f0000000080)) r0 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x4, 0x0) setsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, &(0x7f0000000100), 0x4) [ 1451.475574] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1451.483633] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e62072734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) [ 1451.574243] IPVS: ftp: loaded support on port[0] = 21 [ 1451.595981] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1451.616078] EXT4-fs (loop4): Invalid log cluster size: 1946157056 [ 1451.638112] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 18:59:33 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x11) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000140)=0x63a5b074, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f0000000040)=0x3, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_int(r2, 0x29, 0x21, &(0x7f0000000080)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x563, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1451.706944] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1451.730453] EXT4-fs (loop3): Invalid log cluster size: 1946157056 [ 1451.734250] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 18:59:33 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6, @rand_addr, 0x7000000}, 0x1c) 18:59:33 executing program 0: getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$NLBL_MGMT_C_REMOVEDEF(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) pkey_free(0xffffffffffffffff) [ 1451.763353] EXT4-fs (loop4): Invalid log cluster size: 1946157056 18:59:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e62082734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:33 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x11) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000140)=0x63a5b074, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f0000000040)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x563, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r3) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = dup2(r3, r5) ioctl$IMCTRLREQ(r6, 0x80044945, 0xfffffffffffffffe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_GET_EVENT(0xffffffffffffffff, &(0x7f0000000140)={0xc, 0x8, 0xfa00, {&(0x7f00000003c0)}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @mcast1, 0xfffffff9}}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x4}}, 0x10) accept$phonet_pipe(r2, &(0x7f0000000080), &(0x7f00000000c0)=0x10) 18:59:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef4fa203", 0x3d, 0x400}], 0x0, &(0x7f0000000080)) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x1c081, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f0000000140)={&(0x7f0000000100)=[0x0], 0x1, 0xab}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$unix(r2, &(0x7f0000000240)="032e9f2861020c536125f329e369538e662e2c1fad083d0f7bebee6d44578c4f4a5a7e4179b73cb251ffaaa52139f5aca390822b3def459893354edf279b572e8e2a3739202ee412b3526dbc6ddfff2a88a4ebe646ae2104dc4a2bb390983f4bd7a61b986f593fa0f14e0c35eb54dabecf0f39be45839966b76fb19b04662504eadf8b8055b80f662f06d23d70c4c693252026458f21e037f4393f839eb59abee3561683b7712f12c4558ae619e5a14f919867be7423729ecc2d2cae34defceee3419f79fad8434c143e61ff80d6d4f335886e8aa5d9ef2f1051799e9acd715d", 0xe0, 0x20040000, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) [ 1451.978982] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1452.003167] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:33 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, &(0x7f0000000180)=0x10) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x75, &(0x7f0000000080)={r4}, &(0x7f00000000c0)=0x18) 18:59:33 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x11) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$RXRPC_SECURITY_KEYRING(r2, 0x110, 0x2, &(0x7f0000000080)='(:\xf6[\x00', 0x5) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000140)=0x63a5b074, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f0000000040)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000000080)}}, {{0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000140)}}], 0x2, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1452.050330] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1452.058413] EXT4-fs (loop3): Invalid log cluster size: 1946157056 [ 1452.062877] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1452.073527] EXT4-fs (loop4): Invalid log cluster size: 1946157056 18:59:33 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="bcc88fa85bd8a81a2e0e592d9b7c32865699d09771979164f89c768afdabd02b4c1a00415ca8184f2f32f9d95f7458d75dddba3d922fe5ba412860875f9026c577be7f15d953363e111d87bb7e5dbb7b39f78f8eb7b6a9d70ddcb470a79bb5f733259d74d475811946078a7397f023b82303ad82031bf44baa162cfd5dc1872285996610d0ff3c708d62dd5cd638e0b3afdfacc9aca258311a2d7cec3174bd5e95a71754305e6d8a3a8089524806d7e3906a3d67aa47556134c24e329088309d3b6e5ae73b47cd4a8524268b8e28cda4efaead785362b0d55815da128f615ed82867ce21", @ANYRESDEC, @ANYRESHEX, @ANYRESDEC, @ANYBLOB="7f30d1f99300a125b0ec704dcf9eeff949928cc873de107709a515841829b962505a82b930fca1573aaaafda640a5eda78d16556d0b8ad3bf08dbdd7aa77fb0527025537a56346a4d76289caeae0b8205d668bdaf5e8c4ff37fada46d768f9296fb11fa99aaaa3488f2705912440ccf295eb94ef6d1989c2777bf19424206dec46905fb566235edf26add883222b89193fb0ddb39b01142afe65d728e27ef4e61d21ad0d678cb1da28df1eea0cdb6f9b65dc9c813f2d81855d52ea", @ANYRES16=r0, @ANYRESDEC, @ANYRES16, @ANYRES16, @ANYRES16], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TIOCSPTLCK(r4, 0x40045431, &(0x7f0000000100)=0x1) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r7, 0x84, 0x6e, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @private0}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x66, &(0x7f0000000040)={r8}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r6, 0x84, 0x77, &(0x7f0000000080)={r8, 0x402c, 0x2, [0x5, 0x4]}, &(0x7f00000000c0)=0xc) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="2275000048000000f3ff000000000000", 0x10) r9 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r9, 0x0, 0x30007, 0x0) 18:59:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e62092734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) [ 1452.153365] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1452.167319] EXT4-fs (loop4): Invalid log cluster size: 1946157056 18:59:33 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a14, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="5300000044a6aeabc81e1520000000000000001000fff64017db9820000000000000d403ffff633b27e5"], 0xb4) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, &(0x7f0000000080)=0xb3) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x200a00}]) modify_ldt$write(0x1, 0x0, 0x0) 18:59:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef4fa203", 0x3d, 0x400}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="f4debc15be1d41cd05e59a3667598c49970e02d1d7925f1725a8779bdee3970ccf37b3ef01abaacab1eb71640c198f5ae715633f7b"]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNAPSHOT_PREF_IMAGE_SIZE(r2, 0x3312, 0xfffffffffffffffa) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000100)={0x8, 0x311d}) ioctl$SG_GET_COMMAND_Q(r3, 0x2270, &(0x7f00000000c0)) fcntl$lock(r0, 0x25, &(0x7f0000000140)={0x2, 0x0, 0x9, 0xca}) [ 1452.302193] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1452.351256] EXT4-fs (loop3): Invalid log cluster size: 1946157056 [ 1452.356516] sd 0:0:1:0: [sg0] tag#5570 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK [ 1452.366401] sd 0:0:1:0: [sg0] tag#5570 CDB: Test Unit Ready [ 1452.372348] sd 0:0:1:0: [sg0] tag#5570 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1452.381382] sd 0:0:1:0: [sg0] tag#5570 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1452.390726] sd 0:0:1:0: [sg0] tag#5570 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1452.399675] sd 0:0:1:0: [sg0] tag#5570 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1452.408681] sd 0:0:1:0: [sg0] tag#5570 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1452.417661] sd 0:0:1:0: [sg0] tag#5570 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1452.426674] sd 0:0:1:0: [sg0] tag#5570 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1452.435749] sd 0:0:1:0: [sg0] tag#5570 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1452.444886] sd 0:0:1:0: [sg0] tag#5570 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1452.453826] sd 0:0:1:0: [sg0] tag#5570 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1452.463047] sd 0:0:1:0: [sg0] tag#5570 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1452.472088] sd 0:0:1:0: [sg0] tag#5570 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1452.481122] sd 0:0:1:0: [sg0] tag#5570 CDB[c0]: 00 00 00 00 00 00 00 00 [ 1452.518548] EXT4-fs (loop4): Unrecognized mount option "ôÞ¼¾AÍåš6gYŒI—Ñ×’_%¨w›Þã— Ï7³ï«ªÊ±ëqd Zçc?{" or missing value [ 1452.537210] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1452.554784] EXT4-fs (loop3): Invalid log cluster size: 1946157056 [ 1452.615033] sd 0:0:1:0: [sg0] tag#5576 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK [ 1452.627140] sd 0:0:1:0: [sg0] tag#5576 CDB: Test Unit Ready [ 1452.633057] sd 0:0:1:0: [sg0] tag#5576 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1452.642301] sd 0:0:1:0: [sg0] tag#5576 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1452.651333] sd 0:0:1:0: [sg0] tag#5576 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1452.660376] sd 0:0:1:0: [sg0] tag#5576 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1452.669395] sd 0:0:1:0: [sg0] tag#5576 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1452.678483] sd 0:0:1:0: [sg0] tag#5576 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1452.687584] sd 0:0:1:0: [sg0] tag#5576 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1452.696852] sd 0:0:1:0: [sg0] tag#5576 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1452.705872] sd 0:0:1:0: [sg0] tag#5576 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 18:59:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e62102734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) [ 1452.714902] sd 0:0:1:0: [sg0] tag#5576 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1452.723804] sd 0:0:1:0: [sg0] tag#5576 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1452.732912] sd 0:0:1:0: [sg0] tag#5576 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1452.741879] sd 0:0:1:0: [sg0] tag#5576 CDB[c0]: 00 00 00 00 00 00 00 00 18:59:34 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6, @rand_addr, 0x8000000}, 0x1c) [ 1452.777649] EXT4-fs (loop4): Unrecognized mount option "ôÞ¼¾AÍåš6gYŒI—Ñ×’_%¨w›Þã— Ï7³ï«ªÊ±ëqd Zçc?{" or missing value [ 1452.859371] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1452.887381] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:34 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x4cb03, 0x0) connect$l2tp(r0, &(0x7f0000000400)={0x2, 0x0, @multicast2, 0x4}, 0x10) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef4fa203", 0x3d, 0x400}], 0x0, &(0x7f0000000080)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) r3 = socket$kcm(0x10, 0x2, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') r5 = socket(0xa, 0x3, 0xb26) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) r7 = add_key(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f00000002c0)='4', 0xba, 0xfffffffffffffffe) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000480)=""/91) keyctl$dh_compute(0x17, &(0x7f0000000100)={r7, r6, r7}, 0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={'vmac64(aes)\x00'}}) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) sendmsg$TIPC_CMD_SET_NODE_ADDR(r5, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, r4, 0x100, 0x70bd25, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x6}}, ["", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x43) sendmsg$TIPC_CMD_SET_LINK_PRI(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="95c40000000000000000010001590000000004000000004c00180000000062726f6164636173740002000000000000000000000000000000000000000000000000000000000000000000000000000000000000db5c00"/98], 0x68}}, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r2, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r4, 0x200, 0x70bd2b, 0x25dfdbfe, {{}, {}, {0x8, 0x11, 0x6}}, ["", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0xc0}, 0x8001) setsockopt$inet_mreq(r1, 0x0, 0x24, &(0x7f00000000c0)={@rand_addr=0x64010100, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x8) 18:59:34 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x11) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000140)=0x63a5b074, 0x4) setsockopt$inet6_int(r0, 0x29, 0xb3, &(0x7f0000000040)=0x3, 0x4) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x80800, 0x0) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @private0}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000040)={r3}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f00000000c0)={r3, 0x8}, 0x8) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40)}}, {{0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f00000002c0)=[{0x108, 0x2, 0x7, "2423373edec856547680a58a75fa26dc20f9e0bdd32e295d73a2f543fba0bb7256cb91649032b27fb70b752fe9687efc0f3e1cc5202935ed27047b1ae61c61d8d3b0998153cdf56be4c11001f2b8f3c7229fb9cb3dde32744241ac984f8df68ce93709e72c57fb045cca017a813755cf6b043b9b06205a3a1ad00474d53c668b9bc30974174c6c28dd5c1ce93379faa723044eff70443bba6f64020cab9a40d6d5701ddb9638b092ded20dd3dc564ef5b86621beca47a44dc0526f04427517f4b10554f82a83c92f46611e847842a1b7be36234741104380ee34841c4f66256daf55725c9cdb76b8f15ab21ef0b8659be3"}, {0xa8, 0x1, 0x1, "e0715a2fa94a98209bc1beaea189eb324c35edca4e16915452bfadc32571e888ce5bcac1a3ec0b25f17dbaf57d5b308d57a639e702a10000fb7361a18533b633985f02d0122462219b5270a3f01c5924112b103fde66c38c3092f2240b476755c2195557dc81bb225e1394dc0e88a6dd6ced17e5acb11e7b884b1ed19febe0d25b0aae92f3bd5a93c2bd5d92e9b5a3a6fe0144262338"}, {0x100, 0x103, 0x8000, "5b4cf845d62fa31a00c6251da9fe3cf97439d330ab7907538298bd3a89a3f5ab074900dcc24ac1674906b4d591a129c901c9da0900017cf28014b37d2b65d6a97f13d08065071207eb61ace95499dbdc2cfcb85bcc181eaee9891da581de3ce9dcef03df3af3d253fe330c37a94d9589553f05cace8972935ca57c89fcc73c1966e422b23c036df1f192d77b869c9cf8810898a95a5cf9b092bbaa8f4e2ad140328c88ad41b781d15a617d300773bfc21dbf13836e54ace187cb999b7d4719edc60264019d026bf9e8479a8cecf1cbbc403177d66179f58c3cf150b07eead90da9893b7743830bbafd9d89"}, {0xc8, 0x107, 0x10001, "ebf34abaee30be8d1b631dfad4d121fdd00302fe660f995ea7df236e97fea26d824c740967c9414dcaf000220b3992a55f4e86f5883b03242c00d6b404185e51e1c1842185d9057666308c659d127419c95fa9f20f9a15994fa32737d4ce65775643a5d010eb6045761c02d22979a8ae575f7b68efb355bb9337d2a86901f9be1af84cf45ea6ad900aa049f00b1ec6b3f65d8bebdea880407fba1da259d683447e3472810b00a2eb031eefb7ee1cb7f9d5264bac"}, {0x110, 0x1, 0x7, "5d5b1f947f3a57c6e8e419f1c709aba409166a8f285585cdca7c06b71519f655efc218bc0db98314bb4d967de31e82fb53f7af82ba4d813ed59112f5ab2a3c783ef66c5b82d13fddf96fbe949ccf05537472248ee367141242e99e5b4283bd6101b3f0f50f4966bbd1b3b3febba42ab95db5015f5bfdb044362f64b09cb24186c1dec431ed71d55a960ed3bff4940e98da1bae74ab39c52cd807ba8c54c404481582b0e303a88a7b8801f49b9c6c0e03727f771d68c37a0f285ab9aff0337da281fb31ef1db5f193a800c2dc38af6bb4c3600720ad2285ffd07792d47b52f00d9bb9340b100917437e29bf938b9e0860e88b30dfe15cd5a5dc"}, {0x58, 0x113, 0xfff, "f02ee37f56f87aa8aeaab2ccb15a53a0b6e4a55c713959f791d735169d72100cb1514c0ae3e2ead9c755f9c3e1b4aa94893f20b1b3cf9e168c79dff503896b2c4a9cab0f"}], 0x4e0}}], 0x2, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_GET_DUMPABLE(0x3) [ 1452.972214] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1452.986536] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:34 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) setpgid(0x0, r3) syz_open_procfs(r3, &(0x7f00000003c0)='status\x00') r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) setsockopt$inet6_int(r5, 0x29, 0x21, &(0x7f0000000400)=0x7ffe, 0x10) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$inet_udplite(0x2, 0x2, 0x88) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendto$l2tp6(r8, &(0x7f00000000c0)="9f3c59fb85c1677dd88c63aefa7c3913ddc799681ef91538f3ec3224dc4ded0fb20d6c882a474c70d6051735a14acc7462650e421a4e39670d0b0ea3483efe5fd472aa088678b635e76c3d76b47303bcbdc090a127d48525d6c77d2addf287ab1e93177762e7cec48e5ea3ec4432db5e3655a4995fbe6b68e6d77a07de0468db10a32fc298de370a786921334ae189601fc63566cd3cceecba3340bd5979c3973872959b", 0xa4, 0x80, &(0x7f0000000180)={0xa, 0x0, 0x9ab, @private1={0xfc, 0x1, [], 0x1}, 0x7ff, 0x2}, 0x20) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, &(0x7f0000000040)="2275000048000000f3ff000000000000", 0x10) r9 = accept4(r6, 0x0, 0x0, 0x0) splice(r0, 0x0, r9, 0x0, 0x30007, 0x0) 18:59:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e62142734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) [ 1453.104853] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1453.129499] EXT4-fs (loop4): Invalid log cluster size: 1946157056 18:59:34 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0x494) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000180), 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000040)=0xffffffffffffffff, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000000)={0x0, 0x7ff, 0x80000001}, 0x14) shutdown(r0, 0x2) [ 1453.204988] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1453.213074] EXT4-fs (loop3): Invalid log cluster size: 1946157056 [ 1453.300483] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1453.312982] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:35 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e62252734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:35 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) writev(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) bind$packet(r0, &(0x7f0000000200)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) creat(0x0, 0x0) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) socket(0x0, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) socket(0x0, 0x0, 0x0) [ 1453.546657] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1453.589830] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:35 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e62452734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:35 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6, @rand_addr, 0x9000000}, 0x1c) [ 1453.886528] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1453.932461] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1453.940963] EXT4-fs (loop4): Invalid log cluster size: 1946157056 18:59:35 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x11) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockname$unix(r2, &(0x7f0000000080), &(0x7f0000000100)=0x6e) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x4}, 0xffffffffffffff96) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000140)=0x63a5b074, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f0000000040)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x563, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:59:35 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_STATUS32(r4, 0x80585414, &(0x7f00000000c0)) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x42000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x4, @perf_config_ext={0xfff}, 0xa310, 0x0, 0x2, 0x2, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="2275000048000000f3ff000000000000", 0x10) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000080)=""/25, 0x19) r5 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x30007, 0x0) [ 1454.006728] EXT4-fs (loop3): Invalid log cluster size: 1946157056 [ 1454.173743] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1454.197548] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:35 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e62532734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) [ 1454.408924] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1454.458850] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef4fa203", 0x3d, 0x400}], 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="05974a0a9ca900000000000000cd32"]) 18:59:36 executing program 0: getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, &(0x7f0000000200), &(0x7f0000000540)=0x4) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/route\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="2000000014002101000000000000000002010000", @ANYRES32, @ANYBLOB="08000200e0"], 0x20}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000000)={0x6, @pix_mp={0xfffffffc, 0x0, 0x43564548, 0x0, 0x0, [{0x0, 0x20000000}, {}, {0xfffffffa}, {0x0, 0x3}, {0x0, 0x5}], 0x0, 0x0, 0x6, 0x1}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1c6) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000440)={{0x2, 0x4}, 'port1\x00', 0x0, 0x0, 0x3, 0x3, 0x7fff, 0x3, 0x8, 0x0, 0x3, 0x24}) sendfile(r1, r0, 0x0, 0x800000080004103) 18:59:36 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6, @rand_addr, 0xa000000}, 0x1c) 18:59:36 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a4534fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:36 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[], 0x4240a2a0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x80, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000040)="2275000048000000f3ff000000000000", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x30007, 0x0) r5 = socket(0x10, 0x3, 0x0) r6 = socket$inet(0x2, 0x0, 0xc731e4ea) setsockopt$inet_msfilter(r6, 0x0, 0x8, &(0x7f0000000300)=ANY=[@ANYBLOB="d2"], 0x1) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @local}, &(0x7f0000000000)=0xc) sendmsg$nl_route_sched(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001c40)={&(0x7f00000002c0)=@newqdisc={0x3c, 0x24, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8, 0x8, 'tbf\x00'}, {0x10, 0x2, [@TCA_TBF_PRATE64={0x7}]}}]}, 0x3c}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000100)={'ip6_vti0\x00', &(0x7f0000000080)={'sit0\x00', r7, 0x2f, 0x0, 0x1, 0x5, 0x8, @local, @loopback, 0x8, 0x40, 0x40, 0x1}}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r2, 0x89f9, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000140)={'ip6tnl0\x00', r8, 0x29, 0x0, 0x0, 0x4, 0x4, @mcast1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x20, 0x700, 0x4, 0xfffffeff}}) 18:59:36 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x11) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000140)=0x63a5b074, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f0000000040)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x563, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61, 0x0, 0x43}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r3, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r4}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x6, &(0x7f0000000080)='(^$)$\x00', r4}, 0x30) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000100)={0x80000000, r5}, 0x8) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1455.074074] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1455.103543] sd 0:0:1:0: [sg0] tag#5576 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK [ 1455.112749] sd 0:0:1:0: [sg0] tag#5576 CDB: Test Unit Ready [ 1455.118810] sd 0:0:1:0: [sg0] tag#5576 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1455.123702] EXT4-fs (loop4): Unrecognized mount option "—J [ 1455.123702] œ©" or missing value [ 1455.128510] sd 0:0:1:0: [sg0] tag#5576 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1455.146663] sd 0:0:1:0: [sg0] tag#5576 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1455.156073] sd 0:0:1:0: [sg0] tag#5576 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1455.165064] EXT4-fs (loop3): Invalid log cluster size: 1946157056 [ 1455.165491] sd 0:0:1:0: [sg0] tag#5576 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1455.181190] sd 0:0:1:0: [sg0] tag#5576 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1455.190327] sd 0:0:1:0: [sg0] tag#5576 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1455.190396] sd 0:0:1:0: [sg0] tag#5576 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1455.208455] sd 0:0:1:0: [sg0] tag#5576 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1455.217737] sd 0:0:1:0: [sg0] tag#5576 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1455.227035] sd 0:0:1:0: [sg0] tag#5576 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1455.236143] sd 0:0:1:0: [sg0] tag#5576 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1455.245289] sd 0:0:1:0: [sg0] tag#5576 CDB[c0]: 00 00 00 00 00 00 00 00 18:59:36 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x11) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000140)=0x63a5b074, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$PNPIPE_ENCAP(r3, 0x113, 0x1, &(0x7f0000000100), &(0x7f0000000180)=0x4) r4 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_int(r4, 0x29, 0x3e, &(0x7f0000000040)=0x3, 0x4) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x563, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$sock_linger(r5, 0x1, 0xd, &(0x7f00000000c0)={0x1}, 0x8) shutdown(r5, 0x0) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) fcntl$getownex(r6, 0x10, &(0x7f0000000080)) finit_module(r6, &(0x7f0000000000)='-..\'\xfd![(\x00', 0x3) 18:59:36 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a5334fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) [ 1455.311634] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem 18:59:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef4fa203", 0x3d, 0x400}], 0x0, &(0x7f0000000080)) [ 1455.311652] EXT4-fs (loop3): Invalid log cluster size: 1946157056 [ 1455.450261] sd 0:0:1:0: [sg0] tag#5594 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK [ 1455.459207] sd 0:0:1:0: [sg0] tag#5594 CDB: Test Unit Ready [ 1455.460868] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1455.465109] sd 0:0:1:0: [sg0] tag#5594 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1455.476117] EXT4-fs (loop3): Invalid log cluster size: 1946157056 [ 1455.481623] sd 0:0:1:0: [sg0] tag#5594 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1455.496726] sd 0:0:1:0: [sg0] tag#5594 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1455.505695] sd 0:0:1:0: [sg0] tag#5594 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1455.514852] sd 0:0:1:0: [sg0] tag#5594 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1455.523770] sd 0:0:1:0: [sg0] tag#5594 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1455.532781] sd 0:0:1:0: [sg0] tag#5594 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1455.541807] sd 0:0:1:0: [sg0] tag#5594 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1455.550818] sd 0:0:1:0: [sg0] tag#5594 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1455.559812] sd 0:0:1:0: [sg0] tag#5594 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1455.568820] sd 0:0:1:0: [sg0] tag#5594 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1455.577813] sd 0:0:1:0: [sg0] tag#5594 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1455.586835] sd 0:0:1:0: [sg0] tag#5594 CDB[c0]: 00 00 00 00 00 00 00 00 [ 1455.637133] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1455.637148] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:37 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}, 0x20) [ 1455.688240] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 18:59:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2707fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) [ 1455.741698] EXT4-fs (loop4): Invalid log cluster size: 1946157056 18:59:37 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') [ 1455.810065] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1455.824947] EXT4-fs (loop4): Invalid log cluster size: 1946157056 [ 1455.848931] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem 18:59:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000100)="9e620a2734fa00268700b86a5488029003000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253d24fa203", 0x35, 0x400}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="c72beebff5e1c25ac298827600"]) setsockopt$ALG_SET_AEAD_AUTHSIZE(r1, 0x117, 0x5, 0x0, 0x1ff) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) 18:59:37 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="2275000048000000f3ff000000000000", 0x10) ioctl$PPPIOCGCHAN(r1, 0x80047437, &(0x7f00000000c0)) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TIOCL_GETMOUSEREPORTING(r4, 0x541c, &(0x7f0000000080)) r5 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x30007, 0x0) 18:59:37 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6, @rand_addr, 0xe000000}, 0x1c) [ 1455.935540] x_tables: duplicate underflow at hook 1 [ 1455.947498] EXT4-fs (loop3): Invalid log cluster size: 1946157056 [ 1456.018414] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1456.058368] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:37 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') [ 1456.073840] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 18:59:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a270afa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:37 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') [ 1456.177376] x_tables: duplicate underflow at hook 1 [ 1456.182648] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1456.263742] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1456.282801] EXT4-fs (loop3): Invalid log cluster size: 1946157056 [ 1456.299437] x_tables: duplicate underflow at hook 1 [ 1456.358761] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1456.371185] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:38 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x11) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000140)=0x63a5b074, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f0000000040)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x563, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$6lowpan_enable(r2, &(0x7f0000000080)='0', 0x1) 18:59:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef4fa203", 0x3d, 0x400}], 0x0, &(0x7f0000000080)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_FLUSH(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, r2, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x18, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0xb3be}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3bc}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0xc881}, 0x0) 18:59:38 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') 18:59:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2725fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) [ 1456.574236] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1456.585555] x_tables: duplicate underflow at hook 1 18:59:38 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') 18:59:38 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, 0xfffffffffffffffe, 0x0, 0x0) mmap$snddsp_control(&(0x7f0000ffb000/0x3000)=nil, 0x1000, 0x1000002, 0x10010, r0, 0x83000000) r1 = socket$inet6(0xa, 0x3, 0x11) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0x3c, &(0x7f0000000140)=0x63a5b074, 0x4) setsockopt$inet6_int(r1, 0x29, 0x3e, &(0x7f0000000040)=0x3, 0x4) sendmmsg(r1, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x563, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvfrom$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r2) fchmod(r2, 0x1) [ 1456.638712] EXT4-fs (loop4): Invalid log cluster size: 1946157056 18:59:38 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') [ 1456.702868] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1456.711017] x_tables: duplicate underflow at hook 1 [ 1456.728235] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:38 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0xd5338, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080, 0x0, 0x3a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="2275000048000000f3ff000000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0x0) [ 1456.770421] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1456.779489] EXT4-fs (loop4): Invalid log cluster size: 1946157056 [ 1456.820296] x_tables: duplicate underflow at hook 1 [ 1456.840377] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem 18:59:38 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6, @rand_addr, 0x10000120}, 0x1c) 18:59:38 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') 18:59:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef4fa203", 0x3d, 0x400}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="646f6e826061707072616973652c64656663cc1332b083fde6eb2f6f6e746578743d73746166665f752c00"]) 18:59:38 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a14, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="5300000044a6aeabc81e1520000000000000001000fff64017db9820000000000000d403ffff633b27e5"], 0xb4) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, &(0x7f0000000080)=0xb3) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x200a00}]) modify_ldt$write(0x1, &(0x7f0000000100)={0x5, 0x1800, 0x1000, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1}, 0x10) [ 1456.883196] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a272dfa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) [ 1456.959510] x_tables: duplicate underflow at hook 1 [ 1456.998474] sd 0:0:1:0: [sg0] tag#5576 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK [ 1457.007590] sd 0:0:1:0: [sg0] tag#5576 CDB: Test Unit Ready [ 1457.013429] sd 0:0:1:0: [sg0] tag#5576 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1457.022417] sd 0:0:1:0: [sg0] tag#5576 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1457.031435] sd 0:0:1:0: [sg0] tag#5576 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1457.040508] sd 0:0:1:0: [sg0] tag#5576 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1457.050844] sd 0:0:1:0: [sg0] tag#5576 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1457.059824] sd 0:0:1:0: [sg0] tag#5576 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1457.068813] sd 0:0:1:0: [sg0] tag#5576 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1457.077800] sd 0:0:1:0: [sg0] tag#5576 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1457.086789] sd 0:0:1:0: [sg0] tag#5576 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 18:59:38 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) fcntl$dupfd(r3, 0x0, r2) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') [ 1457.095769] sd 0:0:1:0: [sg0] tag#5576 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1457.104840] sd 0:0:1:0: [sg0] tag#5576 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1457.114098] sd 0:0:1:0: [sg0] tag#5576 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1457.123081] sd 0:0:1:0: [sg0] tag#5576 CDB[c0]: 00 00 00 00 00 00 00 00 [ 1457.131644] EXT4-fs (loop4): Unrecognized mount option "don‚`appraise" or missing value [ 1457.183389] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1457.205770] EXT4-fs (loop3): Invalid log cluster size: 1946157056 [ 1457.219182] EXT4-fs (loop4): Unrecognized mount option "don‚`appraise" or missing value [ 1457.243518] sd 0:0:1:0: [sg0] tag#5576 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK [ 1457.252586] sd 0:0:1:0: [sg0] tag#5576 CDB: Test Unit Ready [ 1457.258432] sd 0:0:1:0: [sg0] tag#5576 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1457.267470] sd 0:0:1:0: [sg0] tag#5576 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1457.276459] sd 0:0:1:0: [sg0] tag#5576 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1457.285700] sd 0:0:1:0: [sg0] tag#5576 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1457.294600] sd 0:0:1:0: [sg0] tag#5576 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1457.303574] sd 0:0:1:0: [sg0] tag#5576 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1457.312548] sd 0:0:1:0: [sg0] tag#5576 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1457.313926] x_tables: duplicate underflow at hook 1 [ 1457.321544] sd 0:0:1:0: [sg0] tag#5576 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1457.321586] sd 0:0:1:0: [sg0] tag#5576 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1457.321624] sd 0:0:1:0: [sg0] tag#5576 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1457.353810] sd 0:0:1:0: [sg0] tag#5576 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1457.362844] sd 0:0:1:0: [sg0] tag#5576 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1457.371915] sd 0:0:1:0: [sg0] tag#5576 CDB[c0]: 00 00 00 00 00 00 00 00 18:59:39 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) fcntl$dupfd(r3, 0x0, r2) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') 18:59:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef4fa203", 0x3d, 0x400}], 0x0, &(0x7f0000000080)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000140)={0xf000000, 0x551, 0xb6e, r0, 0x0, &(0x7f0000000100)={0x990a6b, 0x595, [], @p_u32=&(0x7f00000000c0)=0x800}}) ioctl$BLKGETSIZE(r1, 0x1260, &(0x7f0000000180)) [ 1457.429196] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1457.463692] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:39 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) fcntl$dupfd(r3, 0x0, r2) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') [ 1457.508688] x_tables: duplicate underflow at hook 1 18:59:39 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000001c0)=0x580, 0x4) sendto$inet6(r3, 0x0, 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 18:59:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2733fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) [ 1457.623707] x_tables: duplicate underflow at hook 1 [ 1457.665183] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 18:59:39 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="2275000048000000f3ff000000000000", 0x10) pipe2(&(0x7f0000000200)={0xffffffffffffffff}, 0x4800) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000080)={0x0, 0x0}) setpgid(0x0, r5) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000240)={[], 0xff, 0x4, 0x10000, 0x6, 0x3c7, r5}) r6 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r6, 0x0, 0x30007, 0x0) r7 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x80000, 0x0) r8 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r7, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="34000000cd850f388623442dc9d849431936544b12253143062730fd9c76e8a571cf1b1861c854035d288009f01264b034bad79e3b9643e4f8a9207d0ab8315f7d8d606883ec1aeb22322260326560abe2", @ANYRES16=r8, @ANYBLOB="00022bbd7000fcdbdf250c00000008000600030000000800060000000080080006000100000008000400ff010000"], 0x34}, 0x1, 0x0, 0x0, 0x80}, 0x40000) [ 1457.715962] EXT4-fs (loop4): Invalid log cluster size: 1946157056 [ 1457.737919] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1457.752157] EXT4-fs (loop3): Invalid log cluster size: 1946157056 [ 1457.782829] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1457.801409] EXT4-fs (loop4): Invalid log cluster size: 1946157056 18:59:39 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6, @rand_addr, 0x18020000}, 0x1c) 18:59:39 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') socket(0x10, 0x8000000803, 0x0) socket(0x200000000000011, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') 18:59:39 executing program 1: memfd_create(&(0x7f0000000080)='\xb4\xec:\b\xd2\xdc\xc1x@\xa2?\xe3fRqZ?\x12b\xb7\xe8k\x980\xcc\xa1\"\xe7\x8b\x8aH\x97\x16F\xc8\x94\f\xfb\x069\x1fH\xa3\xd6\xf7Ne\x0e\xfb/\x8e\x9e\xe7\xac$\a\xc3)\xce\xc5\xcf\xa3\xb5y\'&\xe8yrB\xa7/\x86\xbfZ\x92\xa5\x91\xb9\x92\xf9\xc3|W\x15\xc9f\xe9\vj\xaa\xa0m+\x16\xab\x9b\x97\x81Ub\x15)!\xd0\x163[T\x04c\xf2\x02y\xc8\x90\x99\xd2\xd6D\x8b\x90\x83e\x91\x90\xf4\x13\xee)\xb8?\x8e\xf8\x193\x03\xdb\xab\xd1j\xc2\xba\x82\xc8tR\xfa$;\xa7\x86ClT[*l\xfd\x95=Q\xd7[=XS(F\xbc\xd3\x86\xf2D\xbc\xe4\x19\x17\xf5\xff\x80\xb4 o\xd8\xac[\xa4\xc6\x0ea\xab4%\x10\xcbL9/\xe7K\x15\xef\xe6x!%\xfe\xaa\x82k\xabg\xb0\xb0\xd1\x1e\'Y`g\xcb\x96\x9f\xdc\x85:\xb5\xf3q\xaf8\x84\xb9', 0x0) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r0, 0x8200) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1, 0x11, r1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsgid(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mlock(&(0x7f0000001000/0x3000)=nil, 0x3000) 18:59:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef4fa203", 0x3d, 0x400}], 0x0, &(0x7f0000000080)) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x2401, 0x0) bind$vsock_dgram(r0, &(0x7f0000000100)={0x28, 0x0, 0x2710, @my=0x1}, 0x10) [ 1457.882326] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1457.898729] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:39 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') socket(0x10, 0x8000000803, 0x0) socket(0x200000000000011, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') 18:59:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2745fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) [ 1458.026728] audit: type=1804 audit(1595876379.585:502): pid=26618 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir550026038/syzkaller.GUuCiK/1544/bus" dev="sda1" ino=16800 res=1 18:59:39 executing program 1: syz_open_dev$sg(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0xab) write(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) [ 1458.084334] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1458.112227] EXT4-fs (loop4): Invalid log cluster size: 1946157056 18:59:39 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') socket(0x10, 0x8000000803, 0x0) socket(0x200000000000011, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') [ 1458.123895] audit: type=1804 audit(1595876379.585:503): pid=26618 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir550026038/syzkaller.GUuCiK/1544/bus" dev="sda1" ino=16800 res=1 [ 1458.136779] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1458.148723] audit: type=1804 audit(1595876379.585:504): pid=26618 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir550026038/syzkaller.GUuCiK/1544/bus" dev="sda1" ino=16800 res=1 [ 1458.181695] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:39 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') 18:59:39 executing program 1: ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(0xffffffffffffffff, 0xf505, 0x0) listen(0xffffffffffffffff, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='illinois\x00', 0x9) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6, @rand_addr, 0x18020000}, 0x1c) [ 1458.249112] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1458.266788] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1458.274990] EXT4-fs (loop4): Invalid log cluster size: 1946157056 [ 1458.283354] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:39 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') 18:59:40 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="2275000048000000f3ff000000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SG_GET_SG_TABLESIZE(r5, 0x227f, &(0x7f0000000080)) 18:59:40 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6, @rand_addr, 0x20010010}, 0x1c) 18:59:40 executing program 4: openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x1010c0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef4fa203", 0x3d, 0x400}], 0x0, &(0x7f0000000080)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000100)={@map, r1, 0x4}, 0x10) 18:59:40 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2753fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:40 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') 18:59:40 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x200000000000011, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') [ 1459.042243] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1459.067771] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1459.080829] EXT4-fs (loop4): Invalid log cluster size: 1946157056 [ 1459.132813] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:40 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, &(0x7f0000000180)=0x10) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x7d, &(0x7f0000000080)={r4}, &(0x7f00000000c0)=0x18) 18:59:40 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) mmap$xdp(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) remap_file_pages(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef4fa203", 0x3d, 0x400}], 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="34be78426c069286f29557033fa28790310940be95ee1e2335ed2a1f45fc985f80d9fd10b644655e9d2b3a134c8cde25c8e3cec6159b7e1f585c1c73184583dad80a4ff0aadbfe819856e104715d03a4cefac1a55fb051a8df09aff1456a50c1ef8fe80d6d5b9c89cf7c460ba9b9bd6dd964a5081344fcaa81cd71e2d079826906bfa9cb0d31475c00000000e030485e383c64e2ee2c05304d6ffb624f3bc5a468dddeaa480e58a816d8b410270988b84a4f4db70a75113c655b10e746a033580cc8b6addc061d75df2b0f3ea915"]) r2 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f00000011c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000380)="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", 0x4e2, r2) lstat(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="020000000100000000000000040000000000000008000000", @ANYRES32=r5, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r5, @ANYBLOB="1000060000001fcd20"], 0x34, 0x0) keyctl$chown(0x4, r2, r3, r5) 18:59:40 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x200000000000011, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') 18:59:40 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0295e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4001fc) mq_open(&(0x7f0000000080)='ext2\x00', 0x40, 0x0, &(0x7f0000000300)={0x4, 0x101, 0x8eba, 0xfffffffffffffffd}) ioctl$CHAR_RAW_PG(r1, 0x1269, &(0x7f0000000180)={0x6, 0x1, 0x94, &(0x7f0000000240)="aa01764ea65789d3ebaf70daa116fdd73d66af2f6b85b54066230985ec880b27a790e10e3c6efc549389bcedf849d69cf19d9d8ca6253dfd042786d9b24f1fd0bc50f6bfeee6413e591acd751f2ef48a728233c1f30f3870660940fe1fb0bbfba39274e78a983704a8ba63d91c10721b16c871b17726aea2bbc895ec90ad2d31922784832b1234f8951bc0d7b0033b45b33c48ac"}) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef4fa203", 0x3d, 0x400}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="22befcc79e1a1160e5dd2a383b75d62d0669f419355cf4c417ba19b7c9b5a3ef1489849aef1e8dd9c09a6c6c3453be4d"]) setxattr$security_capability(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v1={0x1000000, [{0x7fffffff, 0x8}]}, 0xc, 0x1) 18:59:40 executing program 1: r0 = socket(0x10, 0x803, 0x0) socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x2c, 0x0, 0x100, 0x70bd2d, 0x25dfdbfe, {{}, {}, {0x10, 0x13, @l2={'eth', 0x3a, 'bridge0\x00'}}}, [""]}, 0x2c}, 0x1, 0x0, 0x0, 0x8004}, 0x1000) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=@bridge_getlink={0x2c, 0x12, 0x201, 0x0, 0x0, {}, [@IFLA_ADDRESS={0xa, 0x1, @broadcast}]}, 0x2c}}, 0x0) getsockopt$IP_SET_OP_GET_FNAME(r4, 0x1, 0x53, &(0x7f0000000040)={0x8, 0x7, 0x0, 'syz1\x00'}, &(0x7f0000000540)=0x2c) add_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000040), 0x1d4, r3) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000000)={r3, 0xb8, 0xc0}, &(0x7f0000000280)={'enc=', 'oaep', ' hash=', {'sha512-generic\x00'}}, &(0x7f00000003c0)="5c9cf43d8e80ddeed375eaeece13d63e35f5b7636bbb06f6fad84a82312df3d22f27c73fefeb0a000b7570ef3c76401566d7401544897118cfb468df4e88fb745b1995b60bb2b915c98587e16144eec7917b2d85c69b77b95caafc9a8f528cb414cb1be0997d6dcffa4dfc2a279e1a4ddb54c747e97f69a5db4a765971f1cca6b429eabe8119855087f150465ea6e81afa484b6b057c631234c44dd9f515ffe8d42b80dd2d0a098eb988c7554984e73050d23e78ef7e65e7", &(0x7f0000000480)="858171d710d794c416edd80b90e6f53677aaa31f407fc7eef58a16a327eb63a04eafc103907e2b69530df1705a249c75cac67b8e60a6f6595ab86ffa7070308c3d7d17432c586be9fd8f16fd63b5edd662f13fc9198324def9a45fcbf352a05e454893156888a0a90918fcb2547504a0cf67c56797bd2695c8071e34a53b7db3d44471b89e1fb69081ed32a93e715f6a1e88bf5e4e3ed7203b3593ea2677942c9b19818d66d31384fc345479c36b7dd30aec7699e8f266d94e44a625426cc68b") getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_LOCAL={0x14, 0x2, @ipv4={[], [], @broadcast}}]}, 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b525f}, @IFA_LOCAL={0x14, 0x2, @ipv4={[], [], @broadcast}}]}, 0x34}}, 0x0) [ 1459.418461] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem 18:59:41 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bind$alg(r4, &(0x7f0000000940)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="2275000048000000f3ff000000000000", 0x10) r5 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x30007, 0x0) [ 1459.478335] EXT4-fs (loop3): Invalid log cluster size: 1946157056 [ 1459.483306] EXT4-fs (loop4): Unrecognized mount option ""¾üÇž`åÝ*8;uÖ-iô5\ôĺ·Éµ£ï‰„šïÙÀšll4S¾M" or missing value [ 1459.609486] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1459.621514] EXT4-fs (loop3): Invalid log cluster size: 1946157056 [ 1459.654453] EXT4-fs (loop4): Unrecognized mount option ""¾üÇž`åÝ*8;uÖ-iô5\ôĺ·Éµ£ï‰„šïÙÀšll4S¾M" or missing value 18:59:41 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6, @rand_addr, 0x3f000000}, 0x1c) 18:59:41 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x200000000000011, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') 18:59:41 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r2, &(0x7f00000002c0)=[{&(0x7f00000000c0)="e0", 0x1}, {&(0x7f00000003c0)="05da27b2866df3704971c98c292cd2f33a02e0dd46b2a3f67a9d0399366aa9a7d617c43db12217a0ba6d17843f28d2cf", 0x30}], 0x2) 18:59:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0395e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file1\x00', 0x1, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef4fa203", 0xffffffffffffff1e, 0x400}], 0x3200800, &(0x7f00000000c0)={[], [{@appraise='appraise'}, {@dont_measure='dont_measure'}]}) r0 = getegid() setgid(r0) 18:59:41 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) chdir(&(0x7f0000000140)='./file0\x00') r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x200006) sendfile(r2, r3, 0x0, 0x80001d00c0d0) r4 = socket$inet6(0xa, 0x5, 0x0) close(r4) open(&(0x7f0000000080)='./bus\x00', 0x14f002, 0xc7) sendfile(r4, r2, 0x0, 0x80001d00c0d0) 18:59:41 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') [ 1460.015661] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1460.088835] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:41 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') 18:59:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0495e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) [ 1460.152882] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1460.174101] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:41 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') [ 1460.240733] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1460.363162] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem 18:59:41 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') [ 1460.411813] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDCTL_DSP_NONBLOCK(r3, 0x500e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r1, 0x8010661b, &(0x7f00000000c0)) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef4fa203", 0x3d, 0x400}], 0x0, &(0x7f0000000080)) [ 1460.512502] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1460.533199] EXT4-fs (loop3): Invalid log cluster size: 1946157056 [ 1460.755389] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1460.763202] EXT4-fs (loop4): Invalid log cluster size: 1946157056 18:59:42 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6, @rand_addr, 0x40000000}, 0x1c) 18:59:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0595e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:42 executing program 1: mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="2400000032000903000000000034500a01594800000000000000100001000c00010008008708911e264f9bc4ccf6572a7fb7e8ee92c31868d6fe3a7fa70444ccce6ff95d7bb782ede5d4e1e52e48ee596b66d783071741d2cce388c42ff6e1b5baeeb39f153c08be0000a8b765affd26a906cd006ac5aacc66a49d314afde2"], 0x24}}, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@get={0x1, &(0x7f0000000080)=""/63, 0x82}) dup(0xffffffffffffffff) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:59:42 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') 18:59:42 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="2275000048000000f3ff000000000000", 0x10) sendto$llc(r0, &(0x7f0000000080)="da5408a4aa1d44b204470acf5a0dea2c80db51a87ac9426b1525c1e38f8ee6a43cdb04bb0281c327bda567c444747aa753402efb7417c574732f4411ef421c79c340913c10f8c0d406ba40080fd9f1dd6e830fe6c7572866ce98612143aebe562fc6e20dfd8f60cfd19d149f2c407d754979dceb0985929dec70a5df86ac3600c58f02161c1f51a75657352e14d8ee511bbaacd24c365df3440f89f4e38a1670f81db50b4aac2bd78f8725ce931c36423b315b125a5223b2f807af0a91cce427ae3cb062dc6a", 0xc6, 0x20000000, &(0x7f0000000180)={0x1a, 0x108, 0x6, 0x2, 0x0, 0x0, @broadcast}, 0x10) r3 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000a4a000/0x2000)=nil, 0x2000, 0x0, r3) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000003, r3) r4 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x30007, 0x0) 18:59:42 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x400000, 0x0) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000100)={0x9, 0xa8, 0x6, 0x1, 0x1, "0a50113847ccdadfe5f6791646d8575ad56e1b", 0xf, 0x2}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef4fa203", 0x3d, 0x400}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3e6ba1cc8cdb525d50dc81260d0cce147051dbe0e7449a68e6798bde82731b4333af54111262bb013b9711e8a4f8693dbfa7e43c02e69e2c0b015f0007b273f6676b116b6566a3f8deec8acdb92566fdd7a5584bdb596dd543ddd78475e434bb9e673bf5c1f55341dcb5f5345adcfdc32c952c2b0e7d4eba234c0da0d66ccd4dd46e8f1285e5410b556d4e1ed4d52d77349c8e"]) [ 1460.969983] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1460.983187] EXT4-fs (loop3): Invalid log cluster size: 1946157056 [ 1461.007292] EXT4-fs (loop4): Unrecognized mount option ">k¡ÌŒÛR]PÜ& ÎpQÛàçDšhæy‹Þ‚sC3¯Tb»;—è¤øi=¿§ä<æž" or missing value 18:59:42 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') 18:59:42 executing program 4: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x2, &(0x7f00000001c0)=[{&(0x7f00000000c0)="25bca274769e620a2734fa0095e06148148c0745611930c89b000000000000744e2f98b579d9defba07fa782d257146d0e0206e73ba8c63cd7dcc6760253ef4fa203", 0x42, 0x5}, {&(0x7f0000000180)="ce8a7e7294", 0x5, 0x5}], 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=r0]) 18:59:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0695e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:42 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r1 = socket(0x10, 0x8000000803, 0x0) r2 = socket(0x200000000000011, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') [ 1461.131938] xt_check_table_hooks: 13 callbacks suppressed [ 1461.131948] x_tables: duplicate underflow at hook 1 18:59:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0795e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) [ 1461.204411] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1461.212565] EXT4-fs (loop3): Invalid log cluster size: 1946157056 [ 1461.244064] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 18:59:42 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r1 = socket(0x10, 0x8000000803, 0x0) r2 = socket(0x200000000000011, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') [ 1461.336805] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1461.350294] EXT4-fs (loop3): Invalid log cluster size: 1946157056 [ 1461.372831] x_tables: duplicate underflow at hook 1 18:59:43 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6, @rand_addr, 0x40020000}, 0x1c) 18:59:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file1\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef4fa203", 0x3d, 0x80000000000400}, {&(0x7f0000000100)="dca2578b3207dcc326626a8fc8802ddb7526b1bc164b8918b7d1b1ff2efde5ad4ae43d6255c91930cc36f64c554e70331c25bed624d93b6ec7ee169792c190145b912d5b913072f327a99bba91a29f94c2444a6a74056c9abbe90279bc58c3169b6e4c3f286ea7dbd3843c6bd1bb840a50cbdc0d3f", 0x75, 0xfffffffffffffffd}, {&(0x7f0000000240)="dc6a03eeda0ef93e95d246434c0987f77542cca72bf8b11ca3dae37e46c802421f9618f99055e8588309ea37738141e4cb177bc9630432e78e48c5dea972a5bcafea6eb95745ee8695c20308f62ede706d7a3d3f1171c2c89975aa2e07de9e522751829625503090073adbab31a8770901747f1ec860f9eddc7589ea4c57d6baa986b0df6b68e950a1adf5ff9d9d81ebc71eaf71022bdf21a1c40b427e49561da61493872d", 0xa5, 0x7}], 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="bddceff0fda8d627b6867e97760973376bad0e4491a7c5f8e28edbb52e5bca6c0c938b3803140f451208ed384fc9ff3d48494a11a4a7"]) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x200, 0x0) ioctl$TCGETX(r0, 0x5432, &(0x7f0000000200)) 18:59:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0995e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:43 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r1 = socket(0x10, 0x8000000803, 0x0) r2 = socket(0x200000000000011, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') 18:59:43 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a14, 0x0) chdir(&(0x7f0000000240)='./file0\x00') syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, &(0x7f0000000080)=0xb3) r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) modify_ldt$write(0x1, 0x0, 0x0) 18:59:43 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="2275000048000000f3ff000000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = dup(r0) getpeername$netrom(r4, &(0x7f0000000080)={{0x3, @null}, [@null, @remote, @null, @default, @null, @default, @netrom, @netrom]}, &(0x7f0000000100)=0x48) splice(r0, 0x0, r3, 0x0, 0x30007, 0x0) [ 1461.913006] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1461.921484] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1461.923867] x_tables: duplicate underflow at hook 1 [ 1461.964823] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa2295e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:43 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, 0xffffffffffffffff, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r1 = socket(0x10, 0x8000000803, 0x0) r2 = socket(0x200000000000011, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') 18:59:43 executing program 4: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) setpgid(0x0, r1) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r4, 0x408c5333, &(0x7f00000002c0)={0x7, 0x3f, 0x0, 'queue0\x00', 0xc7}) r5 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$NFT_MSG_GETFLOWTABLE(r5, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000380)={0x5c, 0x17, 0xa, 0x201, 0x0, 0x0, {0xc, 0x0, 0x7}, [@NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x44000}, 0x8000) fcntl$getownex(r2, 0x10, &(0x7f0000000080)) ioctl$F2FS_IOC_RESIZE_FS(r2, 0x4008f510, &(0x7f0000000140)) syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x2, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="25bca274769e620a2734fa0095e0612687ecb86a5488a571422ebaa3daee7840275133dd02a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef4f8795", 0x4b, 0x402}], 0x0, &(0x7f0000000040)=ANY=[@ANYRES32=r1]) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000440)=0x9b1b, 0x4) [ 1462.137952] x_tables: duplicate underflow at hook 1 18:59:43 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, 0xffffffffffffffff, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r1 = socket(0x10, 0x8000000803, 0x0) r2 = socket(0x200000000000011, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') [ 1462.226802] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1462.234922] EXT4-fs (loop3): Invalid log cluster size: 1946157056 [ 1462.263673] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 18:59:43 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x5, 0x0) preadv(r0, &(0x7f0000001080)=[{&(0x7f0000000080)=""/4096, 0x1000}], 0x1, 0x0, 0x0) 18:59:43 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, 0xffffffffffffffff, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r1 = socket(0x10, 0x8000000803, 0x0) r2 = socket(0x200000000000011, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') [ 1462.291361] x_tables: duplicate underflow at hook 1 [ 1462.323196] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1462.330899] EXT4-fs (loop3): Invalid log cluster size: 1946157056 [ 1462.346036] x_tables: duplicate underflow at hook 1 18:59:44 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6, @rand_addr, 0x51bf9ad9}, 0x1c) 18:59:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa2395e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000000)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000600)) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x4, 0x470, 0xffffffff, 0x0, 0x208, 0x208, 0xffffffff, 0xffffffff, 0x3d8, 0x3d8, 0x3d8, 0xffffffff, 0x4, &(0x7f0000000080), {[{{@uncond, 0x0, 0x1e0, 0x208, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x11, "46db"}}, @common=@inet=@sctp={{0x148, 'sctp\x00'}, {[0x4e23, 0x4e22], [0x4e20, 0x4e24], [0x8, 0x7, 0x1, 0x3, 0x52d2, 0xffffffff, 0x1, 0x6, 0x0, 0x1, 0x4, 0x1, 0x401, 0x88f0, 0x7fff, 0x9, 0x7, 0x7, 0xb7b, 0x5, 0x400, 0x800, 0x7, 0x8, 0x0, 0x7, 0x0, 0x80000000, 0xe51d, 0x4, 0xfffff632, 0x40, 0x1, 0xad, 0xe090, 0x5, 0x40, 0x10000, 0x5, 0x0, 0x4, 0x200, 0x3, 0xc0000000, 0x5b0, 0x20, 0x8, 0xc3, 0x10001, 0xffffffff, 0x4, 0x4, 0x4, 0xf26, 0x800, 0x4, 0x3f, 0x3, 0xffffff3d, 0x0, 0x3, 0x7ff, 0x6, 0x5], 0x1, [{0x1, 0x0, 0xff}, {0x76, 0x40, 0x1f}, {0x81, 0x81, 0xff}, {0x80, 0x6, 0x6e}], 0x4, 0x2, 0x4}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ip={@private=0xa010100, @rand_addr=0x64010101, 0xff000000, 0xff, 'veth0_to_team\x00', 'bond_slave_0\x00', {0xff}, {}, 0x1, 0x3, 0x39}, 0x0, 0xb8, 0xe0, 0x0, {}, [@common=@unspec=@addrtype1={{0x28, 'addrtype\x00'}, {0x8a8, 0x204, 0x1}}, @common=@socket0={{0x20, 'socket\x00'}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x5}}}, {{@uncond, 0x0, 0xc0, 0xf0, 0x0, {}, [@common=@osf={{0x50, 'osf\x00'}, {'syz1\x00', 0x0, 0xc, 0x1}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1, {0x200, 0x3, 0x1, 0x2}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4d0) 18:59:44 executing program 1: dup2(0xffffffffffffffff, 0xffffffffffffffff) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) 18:59:44 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r1 = socket(0x10, 0x8000000803, 0x0) r2 = socket(0x200000000000011, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') 18:59:44 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x9, 0x0, 0x0, 0x41c1, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}, 0xc010, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="2275000048000000f3ff000000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0x0) [ 1462.857675] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1462.884225] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1462.894390] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa2c95e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:44 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xd, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) io_setup(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6c00) creat(0x0, 0x40) mkdirat(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) open$dir(0x0, 0x250400, 0xc0) mkdirat(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) renameat(0xffffffffffffffff, 0x0, r0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) open$dir(0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000080)=ANY=[], 0x8) setsockopt$inet6_int(r2, 0x29, 0x8, &(0x7f0000000100)=0x8143, 0x4) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) prctl$PR_GET_KEEPCAPS(0x7) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000003180)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) fdatasync(0xffffffffffffffff) sendmsg$NL80211_CMD_SET_MESH_CONFIG(0xffffffffffffffff, 0x0, 0x0) ftruncate(r3, 0x7fff) sendfile(r2, r3, 0x0, 0x8000fffffffe) 18:59:44 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r1 = socket(0x10, 0x8000000803, 0x0) r2 = socket(0x200000000000011, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') [ 1462.921781] x_tables: duplicate underflow at hook 2 18:59:44 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r1 = socket(0x10, 0x8000000803, 0x0) r2 = socket(0x200000000000011, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') 18:59:44 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r0 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r1 = socket(0x10, 0x8000000803, 0x0) r2 = socket(0x200000000000011, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') [ 1463.020311] x_tables: duplicate underflow at hook 2 18:59:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef4fa203", 0x3d, 0x400}], 0x0, &(0x7f0000000080)) prctl$PR_SET_TIMERSLACK(0x1d, 0x7ff) [ 1463.093140] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1463.117936] EXT4-fs (loop3): Invalid log cluster size: 1946157056 [ 1463.202882] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1463.203037] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1463.214081] EXT4-fs (loop3): Invalid log cluster size: 1946157056 [ 1463.226368] EXT4-fs (loop4): Invalid log cluster size: 1946157056 18:59:45 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6, @rand_addr, 0x8dffffff}, 0x1c) 18:59:45 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r0 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r1 = socket(0x10, 0x8000000803, 0x0) r2 = socket(0x200000000000011, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') 18:59:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa2d95e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:45 executing program 4: getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, &(0x7f0000000200), &(0x7f0000000540)=0x4) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/route\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="2000000014002101000000000000000002010000", @ANYBLOB="08000200e0"], 0x20}}, 0x0) ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000000)={0x6, @pix_mp={0xfffffffc, 0x0, 0x43564548, 0x0, 0x0, [{0x0, 0x20000000}, {}, {0xfffffffa}, {0x0, 0x3}, {0x0, 0x5}], 0x0, 0x0, 0x6, 0x1}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="5300000044a6aeabc81e152000000000000007000000f64017db9820000000000000d403ffff633b27e59aa146174dd106736d173f0fc7ec6e26560000000049d2e181baf9459c5c953948c6a600000000000000c552fc99a7422007653872ecb4f63acdfe80812d274014ae40b8ae4f2a88d2fbea75fd063f026ed7360627ec60cb274e00da971f7ee096d74c92fad7e34bd5522d45cc36c2442eac2d224609aba9e6000000000000000000000000000000f390d71cc6092cddd3b049f3fc65d61c2b3c65f2f80a61ea6e457ebc93981b20e03b86d4e999bbb53a7b0ee0ce30e80600cff8ca2996e518e3e69051f6d24317f9ebfeb82ee2469fb31bdbb2768d25f196ab6f2dc045421b94d878d0d9c2a5c74633a687a135308e49ce118c81517a"], 0x1c6) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000440)={{0x2, 0x4}, 'port1\x00', 0x0, 0x0, 0x3, 0x3, 0x0, 0x0, 0x8, 0x0, 0x3, 0x24}) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) syz_open_dev$usbfs(0x0, 0x0, 0x0) semop(0x0, &(0x7f0000000180)=[{0x4, 0x5c}], 0x1) sendfile(r1, r0, 0x0, 0x800000080004103) 18:59:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SCSI_IOCTL_GET_IDLUN(r1, 0x5382, &(0x7f00000000c0)) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000040)="2275000048000000f3ff000000000000", 0x10) r5 = accept4(r4, 0x0, 0x0, 0x0) splice(r2, 0x0, r5, 0x0, 0x30007, 0x0) [ 1463.809251] sd 0:0:1:0: [sg0] tag#5599 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK [ 1463.818228] sd 0:0:1:0: [sg0] tag#5599 CDB: Test Unit Ready [ 1463.824050] sd 0:0:1:0: [sg0] tag#5599 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1463.833086] sd 0:0:1:0: [sg0] tag#5599 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1463.842111] sd 0:0:1:0: [sg0] tag#5599 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 18:59:45 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r0 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r1 = socket(0x10, 0x8000000803, 0x0) r2 = socket(0x200000000000011, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') [ 1463.851549] sd 0:0:1:0: [sg0] tag#5599 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1463.860599] sd 0:0:1:0: [sg0] tag#5599 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1463.869562] sd 0:0:1:0: [sg0] tag#5599 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1463.878588] sd 0:0:1:0: [sg0] tag#5599 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1463.887611] sd 0:0:1:0: [sg0] tag#5599 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1463.896669] sd 0:0:1:0: [sg0] tag#5599 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 18:59:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa4895e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) [ 1463.905657] sd 0:0:1:0: [sg0] tag#5599 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1463.914559] sd 0:0:1:0: [sg0] tag#5599 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1463.923583] sd 0:0:1:0: [sg0] tag#5599 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1463.932561] sd 0:0:1:0: [sg0] tag#5599 CDB[c0]: 00 00 00 00 00 00 00 00 [ 1463.940020] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1463.940036] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:45 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'macvlan0\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0xfffffffffffffecd, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=r5, @ANYBLOB="19000000000000001c0012000c00010062726964676500000c0002000800050001"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x2e, &(0x7f0000000040)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0xa, 0x0, r2}, [@IFLA_MASTER={0x8, 0xa, r5}]}, 0x28}}, 0x0) 18:59:45 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') [ 1464.080496] x_tables: duplicate underflow at hook 1 18:59:45 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') [ 1464.130114] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1464.130131] EXT4-fs (loop3): Invalid log cluster size: 1946157056 [ 1464.137757] IPv6: ADDRCONF(NETDEV_UP): bridge1: link is not ready [ 1464.164056] bridge1: port 1(macvlan0) entered blocking state [ 1464.164097] bridge1: port 1(macvlan0) entered disabled state [ 1464.190914] sd 0:0:1:0: [sg0] tag#5598 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK [ 1464.193844] device macvlan0 entered promiscuous mode [ 1464.199882] sd 0:0:1:0: [sg0] tag#5598 CDB: Test Unit Ready [ 1464.210898] sd 0:0:1:0: [sg0] tag#5598 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1464.218812] bridge1: port 1(macvlan0) entered blocking state [ 1464.219889] sd 0:0:1:0: [sg0] tag#5598 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1464.225712] bridge1: port 1(macvlan0) entered listening state [ 1464.234613] sd 0:0:1:0: [sg0] tag#5598 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1464.253542] sd 0:0:1:0: [sg0] tag#5598 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1464.262581] sd 0:0:1:0: [sg0] tag#5598 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1464.271569] sd 0:0:1:0: [sg0] tag#5598 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1464.280564] sd 0:0:1:0: [sg0] tag#5598 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1464.290122] sd 0:0:1:0: [sg0] tag#5598 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1464.290163] sd 0:0:1:0: [sg0] tag#5598 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1464.290205] sd 0:0:1:0: [sg0] tag#5598 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1464.290245] sd 0:0:1:0: [sg0] tag#5598 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1464.290286] sd 0:0:1:0: [sg0] tag#5598 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 18:59:45 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)={0x48, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}]}, 0x48}}, 0x0) [ 1464.290326] sd 0:0:1:0: [sg0] tag#5598 CDB[c0]: 00 00 00 00 00 00 00 00 [ 1464.295149] x_tables: duplicate underflow at hook 1 [ 1464.376366] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem 18:59:45 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a14, 0x0) chdir(&(0x7f0000000240)='./file0\x00') syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="5300000044a6aeabc81e1520000000000000001000fff64017db9820000000000000d403ffff633b27e59aa146175dd106736d173f0fc7ec6e26560000000049d2e181baf9459c5c953948c6801d2c0945c08ba8c552fc99a7c2de6c37742817a9a4276a2f3365f1714474f24f4d14ba8b2f93df19496b0eeb3deaf68a23e010fb5c01ba80f9694d1d0bbc13cd7249e325dfb71c58a022ab0353aeb8181f5a11cc76b106fbd6"], 0xb4) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, 0x0, &(0x7f0000000340)) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"/410], &(0x7f0000000080)=0xb3) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) modify_ldt$write(0x1, &(0x7f0000000100)={0x5, 0x1800, 0x1000, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1}, 0x10) syz_open_dev$usbfs(0x0, 0x1a9f, 0x0) [ 1464.391186] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:46 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6, @rand_addr, 0x91ffffff}, 0x1c) 18:59:46 executing program 1: write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(0xffffffffffffffff, 0x0, 0x63) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000200)}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) syz_emit_ethernet(0x300cce, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaa000000008000910000"], 0x0) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f00000000c0)={0x401, 0x0, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x81, 0x4, 0x0, 0x0, "f608a31a"}, 0x0, 0x0, @userptr, 0x0, 0x0, r0}) 18:59:46 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') 18:59:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa4c95e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:46 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="2275000048000000f3ff000000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0x0) 18:59:46 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/snmp6\x00') preadv(r0, &(0x7f00000017c0), 0x375, 0x0, 0x0) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x34, 0x8, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x6}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x34}, 0x1, 0x0, 0x0, 0x884}, 0x20040010) sched_setattr(0x0, 0x0, 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) getpid() write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(0xffffffffffffffff) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 18:59:46 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') [ 1464.708098] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1464.736348] EXT4-fs (loop3): Invalid log cluster size: 1946157056 [ 1464.806671] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1464.814186] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa6095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:46 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$F2FS_IOC_RELEASE_COMPRESS_BLOCKS(r0, 0x8008f512, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860ac5cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfed4, 0x20c49a, 0x0, 0x27) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000000), 0x4) 18:59:46 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') [ 1465.041386] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1465.058776] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa6895e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:46 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') [ 1465.240605] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1465.251751] EXT4-fs (loop3): Invalid log cluster size: 1946157056 [ 1465.320492] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1465.342482] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:47 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6, @rand_addr, 0xd99abf51}, 0x1c) 18:59:47 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r0 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r1 = socket(0x10, 0x8000000803, 0x0) r2 = socket(0x200000000000011, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') 18:59:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa6c95e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:47 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a14, 0x0) chdir(&(0x7f0000000240)='./file0\x00') syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="5300000044a6aeabc81e1520000000000000001000fff64017db9820000000000000d403ffff633b27e59aa146175dd106736d173f0fc7ec6e26560000000049d2e181baf9459c5c953948c6801d2c0945c08ba8c552fc99a7c2de6c37742817a9a4276a2f3365f1714474f24f4d14ba8b2f93df19496b0eeb3deaf68a23e010fb5c01ba80f9694d1d0bbc13cd7249e325dfb71c58a022ab0353aeb8181f5a11cc76b106fbd6"], 0xb4) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, 0x0, &(0x7f0000000340)) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"/410], &(0x7f0000000080)=0xb3) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) modify_ldt$write(0x1, &(0x7f0000000100)={0x5, 0x1800, 0x1000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1}, 0x10) syz_open_dev$usbfs(0x0, 0x1a9f, 0x0) 18:59:47 executing program 2: getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={r0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000300)={r0, 0x1}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000380)={r1, 0x9, 0x2, 0x9}, 0x10) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) readahead(r4, 0xa13, 0x95c) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$kcm(0x10, 0x2, 0x10) r8 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000006c0)={0x34, r8, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x20, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}]}]}, 0x34}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(r6, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0x110, r8, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x58, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_vlan\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x9440}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x200}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x6}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x80000000}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x31}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}, @IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e22}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x56}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x52}]}, @IPVS_CMD_ATTR_SERVICE={0x18, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@loopback}]}]}, 0x110}, 0x1, 0x0, 0x0, 0x48800}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000040)="2275000048000000f3ff000000000000", 0x10) r9 = accept4(r4, 0x0, 0x0, 0x0) splice(r2, 0x0, r9, 0x0, 0x30007, 0x0) [ 1465.626299] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1465.657199] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:47 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r0 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r1 = socket(0x10, 0x8000000803, 0x0) r2 = socket(0x200000000000011, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') 18:59:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa7495e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:47 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r0 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r1 = socket(0x10, 0x8000000803, 0x0) r2 = socket(0x200000000000011, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') [ 1465.771269] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1465.789677] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:47 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$F2FS_IOC_RELEASE_COMPRESS_BLOCKS(r0, 0x8008f512, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860ac5cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfed4, 0x20c49a, 0x0, 0x27) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000000), 0x4) 18:59:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa7a95e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:47 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x240540c3, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00000002c0)='#', 0x1, 0x20042041, &(0x7f0000000240)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x1c) 18:59:47 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') [ 1465.979226] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1465.987482] EXT4-fs (loop3): Invalid log cluster size: 1946157056 [ 1466.040311] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1466.052167] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:47 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6, @rand_addr, 0xf5ffffff}, 0x1c) 18:59:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') recvmmsg(r2, &(0x7f0000004d80)=[{{0x0, 0x0, 0x0}}], 0x58, 0x1200a, 0x0) sendmsg$ETHTOOL_MSG_STRSET_GET(r2, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000000)=ANY=[@ANYBLOB="18000000", @ANYRES16=r3, @ANYBLOB="03070006000800fdff001900000004000180"], 0x18}}, 0x0) 18:59:47 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') 18:59:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fac095e0612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:48 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') [ 1466.494474] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1466.519514] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:48 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0xc2, 0x0, 0x0, 0x0, {[@sack_perm={0x4, 0xffffffffffffff96}]}}}}}}}}, 0x0) 18:59:48 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x4) ioctl$DRM_IOCTL_MODE_CURSOR2(r2, 0xc02464bb, &(0x7f0000000100)={0x1, 0x2, 0x81, 0xdb47, 0xde75, 0x1, 0x81, 0x200, 0x5}) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r2, 0xc01064c7, &(0x7f0000000080)={0x2, 0x0, &(0x7f0000000180)=[0x0, 0x0]}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bind$phonet(r5, &(0x7f0000000140)={0x23, 0x0, 0xfb, 0x5}, 0x10) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, &(0x7f0000000040)="2275000048000000f3ff000000000000", 0x10) r7 = accept4(r6, 0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r7, 0x0, 0x2, 0x0) [ 1466.603341] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1466.631730] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:48 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x630, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0xd8, 0x120, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x690) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') [ 1466.674102] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 18:59:48 executing program 1: write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(0xffffffffffffffff, 0x0, 0x63) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x402, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x402, 0x0) pwritev(r1, &(0x7f00000001c0)=[{&(0x7f0000000200)="fa023fe0a409ccd917", 0x9}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x300cce, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaa000000008000910000008100000086dd60000000000000000000000500000000020000002200"/56], 0x0) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f00000000c0)={0x401, 0x1, 0x4, 0x2, 0x9, {0x77359400}, {0x4, 0xc, 0x81, 0x4, 0x3, 0x25, "f608a31a"}, 0x400, 0x2, @userptr, 0x81, 0x0, 0xffffffffffffffff}) connect$netlink(r2, 0x0, 0x0) 18:59:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa009514612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:48 executing program 4: syz_emit_ethernet(0x62, &(0x7f0000000180)=ANY=[@ANYBLOB="ffffffffffff0180c200000086dd6042bf04002c2c00fe8003100000000000000d00000000aaff020000000000000000000000000001"], 0x0) 18:59:48 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x630, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0xd8, 0x120, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x690) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') [ 1466.816356] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1466.837045] EXT4-fs (loop3): Invalid log cluster size: 1946157056 [ 1466.914925] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1466.929457] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:48 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6, @rand_addr, 0xfc000000}, 0x1c) 18:59:48 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x42e, &(0x7f00000001c0)={@broadcast, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "f2f2f1", 0x3f8, 0x3a, 0xff, @remote, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [{0x0, 0xb, "a78c000004ff000053d5dea6b259fe8000000000000023493b87aa0568f00b0d71a8242373244ad2439adc07df0a69748e254c1e4a8a8b3f0ab0c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a803721d"}, {0x0, 0x16, "84f0da52ef24571313968050378ee824f4dffba6feed320516e05a45c70daf0622c51c7a93e357f7671975afc9c545c59d6137c8ce680ba2d2e8794cc0ee661ab31313a50f67f637326bdc20eee126a2c281295ae9405b24d13dc48b7b6aa26e8a94498418f3472f7281922377d30a3b5ed2c6a2990e5ea6b275c1d5bddf59f3d1843df268e8551f1f8f4723b8c825c6b2cff208dfb5cd8283d0dcd52a6de228bf697d3d6506afec30ef7e07413c7afc1eb139e0"}, {0x0, 0x5a, "062bf7b5e0f2dbbdc849b90d4e80a0e3f7af088060d01a1cfcfad88ef4512c6ef5c0ead4b9cc87484b106a060a9899d50f595204418f51e91480b395741dd314136a262cadf02b071d88e61703f037caded0b315701274012fa532ddd69499074e1a2df196e0afcffda08fb3d82ab8160253a47d3efc3d7cead55c28610ae20f69aaced0a1a6ce815344cf8d0bc8a0dfcdd1e8cd7242601777ec653c2d4b704397dcb1350982afd017eaa630c840d71589499fd68239ae0c0aa2fc9b949d1a716d40a24f078e92e8c268ff726290944b5f3a3bea9559f2d2a51405fba224411ecc49544dea47917a98bf79c3c8eed70429abf70a52ecbda21c9bf0f6a70cd2c2c887391e4095ad223437c60abf829447b47bd231ca2a98d9da7519a4bd28e803fa000fafc0dc453ed56cdf4356d7abcfec4eed0b94a4f78ce44a7177c6684026bb4f26a17e52e326c8bb7be5e2ea5780d7169d8f4ff62cb2b223f1d6221f62e0ee0244d86042560edd36853c464b23be536c65b87cd5ea60932ed90607b369ed2017f645afcb5cd07f6896a08473bd5dea2bfb52ac501a39c338ede985aa4a7755db876cc1558aac15ad4d6c078834be4d944f3cce0079d2ad9ba8d17f01a614052aadbd4af0fd282f594dc4530ee49b6c9ae6d5d80a073e678594be2e2f0869baa2a58dd2d0f6a995fb706c4d1b618d57da1c2d8f55611f746105a947b4f6bb74dbdbffb1b3c1f2316f6a28a07f0145b1bf8345b6aa4e9d5a819497856792121219ea151c1f8e2f86356039bc5b87fe4cad68b6afa08687e6e751803865165eac0c34bdddae1bbe52f55d08cc4a0865f8df372635e8a26ac4ac9716a124ac4e83349f17b612e2b1893b5eaccecc7d812bb4f4fc6b313f57c2035a90f782a4a97b5f5309b6c5798d72b9187f3d411e84041e3671fe35e39fa1887846721c38d501b471990b919d2ad9ca9bc71157a843d75838c0aa4ff0dabd74284709f1f87f324ec4f56eacd70e6bb5e9677e719786c4d4284e4c"}]}}}}}}, 0x0) 18:59:48 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x630, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0xd8, 0x120, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x690) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') 18:59:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa009515612687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:48 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a14, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="5300000044a6aeabc81e1520000000000000001000fff64017db9820000000000000d403ffff633b27e5"], 0xb4) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, &(0x7f0000000080)=0xb3) r1 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x200a00}]) modify_ldt$write(0x1, &(0x7f0000000100)={0x5, 0x1800, 0x1000, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x10) [ 1467.385546] IPv6: addrconf: prefix option has invalid lifetime [ 1467.398663] sd 0:0:1:0: [sg0] tag#5605 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK [ 1467.407643] sd 0:0:1:0: [sg0] tag#5605 CDB: Test Unit Ready [ 1467.413434] sd 0:0:1:0: [sg0] tag#5605 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1467.422483] sd 0:0:1:0: [sg0] tag#5605 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1467.431472] sd 0:0:1:0: [sg0] tag#5605 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1467.442059] sd 0:0:1:0: [sg0] tag#5605 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1467.451068] sd 0:0:1:0: [sg0] tag#5605 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1467.460088] sd 0:0:1:0: [sg0] tag#5605 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1467.469090] sd 0:0:1:0: [sg0] tag#5605 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 18:59:49 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="2275000048000000f3ff000000000000", 0x10) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept$inet(r4, 0x0, &(0x7f00000004c0)) r5 = accept4(r2, 0x0, 0x0, 0x0) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="020000000100000000000000040000000000000008000000", @ANYRES32=r7, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r7, @ANYBLOB="1000060000001fcd20"], 0x34, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6, 0x3, &(0x7f0000000300)=[{&(0x7f0000000100)="ba1bbb7e4f193888f096fff01b95277167a64a5f5d991c28202a64bca35ff14494d1663f8b94403c53d55f9a75ae9d55e20cf75cfb82183713aa7277cb69089be360bbeee0bfbdc99a8c23dcec7d9e4ca9503312544bcd1c77e1e3c716bb5a556d7b4f39e01f3cab787419c430edcc3dae0ea465bb9df988a97e0450c5591544dc01982c4dc1aaff050f5f69e87ea6c2d0f6886e32ed7d86691a2140fe9020be1e73f7eac0eb306c85c581364a700721864aa83966c8f71fcb5dd86b67c7f106241d1a13698039314fa1932be376fd73900841705a084546daeab315b51002f66e4159afbe463ba79a900c768161c4b494bedf5cd5b47d54f536", 0xfa, 0x401}, {&(0x7f0000000200)="9bd90f20a1aaf255bb2669d8e152682f597d41399022b845628a1a462a28ea41ceccec654876c57f0cff717ce7a7ecc6b574963e7ade7a033f948c1e", 0x3c, 0x100000000}, {&(0x7f0000000240)="519596c77ad654f4a2d07ea8d417a68b209ab2d75ed1c7cabf13a3a8b6a5039528409fe724160b299e12e35d02a968e8ab82c3ed590c748f96c7f7e0e1ccd46a022c78321fa7fefb85be5a4570129dab82b791bfe14273fc6fc53d790ddf01b8405cc3cf49681fee4f0ec6acf3c3464faa249d2d5b6dc99faaea7085ca6d8286b10864", 0x83, 0x92}], 0x10, &(0x7f0000000380)={[{@errors_remount='errors=remount-ro'}, {@case_sensitive_yes='case_sensitive=yes'}, {@show_sys_files_yes='show_sys_files=yes'}, {@gid={'gid', 0x3d, r7}}, {@case_sensitive_no='case_sensitive=no'}, {@disable_sparse_yes='disable_sparse=yes'}, {@gid={'gid'}}], [{@subj_user={'subj_user', 0x3d, 'hash\x00'}}, {@obj_role={'obj_role', 0x3d, '}#$*/_\x00'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@measure='measure'}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@subj_type={'subj_type', 0x3d, '+'}}, {@func={'func', 0x3d, 'MODULE_CHECK'}}]}) splice(r0, 0x0, r5, 0x0, 0x30007, 0x0) [ 1467.478209] sd 0:0:1:0: [sg0] tag#5605 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1467.487360] sd 0:0:1:0: [sg0] tag#5605 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1467.496819] sd 0:0:1:0: [sg0] tag#5605 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1467.505907] sd 0:0:1:0: [sg0] tag#5605 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1467.515730] sd 0:0:1:0: [sg0] tag#5605 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1467.524836] sd 0:0:1:0: [sg0] tag#5605 CDB[c0]: 00 00 00 00 00 00 00 00 18:59:49 executing program 4: ioctl$TCSETXW(0xffffffffffffffff, 0x5435, &(0x7f0000000140)={0x0, 0x0, [0x800, 0x0, 0x0, 0x0, 0x1], 0x84}) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x200000003, 0x84) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) connect$inet(r2, &(0x7f0000001280)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x19401, 0x0) 18:59:49 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x658, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x100, 0x148, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6b8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') [ 1467.573295] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1467.609545] sd 0:0:1:0: [sg0] tag#5611 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK [ 1467.618416] sd 0:0:1:0: [sg0] tag#5611 CDB: Test Unit Ready [ 1467.624208] sd 0:0:1:0: [sg0] tag#5611 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1467.633239] sd 0:0:1:0: [sg0] tag#5611 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1467.642263] sd 0:0:1:0: [sg0] tag#5611 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1467.651262] sd 0:0:1:0: [sg0] tag#5611 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1467.660264] sd 0:0:1:0: [sg0] tag#5611 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1467.669242] sd 0:0:1:0: [sg0] tag#5611 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1467.678286] sd 0:0:1:0: [sg0] tag#5611 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1467.687357] sd 0:0:1:0: [sg0] tag#5611 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1467.696397] sd 0:0:1:0: [sg0] tag#5611 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1467.705581] sd 0:0:1:0: [sg0] tag#5611 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1467.714521] sd 0:0:1:0: [sg0] tag#5611 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 18:59:49 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x658, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x100, 0x148, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6b8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') [ 1467.723523] sd 0:0:1:0: [sg0] tag#5611 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1467.723720] EXT4-fs (loop3): Invalid log cluster size: 1946157056 [ 1467.732549] sd 0:0:1:0: [sg0] tag#5611 CDB[c0]: 00 00 00 00 00 00 00 00 18:59:49 executing program 1: mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x24}}, 0x0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000100)=@get={0x1, &(0x7f0000000080)=""/63, 0x82}) dup(0xffffffffffffffff) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) [ 1467.846000] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1467.853642] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e00a2687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:49 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x658, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x100, 0x148, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6b8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') [ 1468.017679] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1468.044062] EXT4-fs (loop3): Invalid log cluster size: 1946157056 [ 1468.108173] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1468.123630] EXT4-fs (loop3): Invalid log cluster size: 1946157056 [ 1468.141237] ntfs: (device loop2): parse_options(): Unrecognized mount option subj_user. 18:59:49 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6, @rand_addr, 0xfe800000}, 0x1c) 18:59:49 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x640, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6a0) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') 18:59:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0252687ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:49 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x640, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6a0) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') [ 1468.369254] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1468.378050] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:50 executing program 4: syz_open_procfs(0x0, &(0x7f0000000180)='net/snmp6\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 1468.465851] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1468.495749] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:50 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r0, 0xc0905664, &(0x7f0000000080)={0x0, 0x0, [], @bt={0xffffffff, 0x401, 0x3f, 0x7, 0xb51, 0x70, 0x19, 0x9}}) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="2275000048000000f3ff000000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0x0) 18:59:50 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x640, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6a0) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') 18:59:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0614587ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:50 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x590, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0xd8, 0x120, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5f0) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') [ 1468.692801] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1468.732089] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r2, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) 18:59:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0615387ecb86a548802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:50 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'macvlan0\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0xfffffffffffffecd, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=r5, @ANYBLOB="19000000000000001c0012000c00010062726964676500000c0002000800050001"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x2e, &(0x7f0000000040)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0xa, 0x0, r2}, [@IFLA_MASTER={0x8, 0xa, r5}]}, 0x28}}, 0x0) [ 1468.943512] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1468.960850] IPv6: ADDRCONF(NETDEV_UP): bridge1: link is not ready [ 1468.968314] EXT4-fs (loop3): Invalid log cluster size: 1946157056 [ 1468.988830] bridge1: port 1(macvlan0) entered blocking state [ 1468.998658] bridge1: port 1(macvlan0) entered disabled state [ 1469.007408] device macvlan0 entered promiscuous mode [ 1469.014018] bridge1: port 1(macvlan0) entered blocking state [ 1469.019975] bridge1: port 1(macvlan0) entered listening state [ 1469.023834] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1469.035735] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:50 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6, @rand_addr, 0xfec00000}, 0x1c) 18:59:50 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x590, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0xd8, 0x120, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5f0) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') 18:59:50 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'macvlan0\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0xfffffffffffffecd, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=r5, @ANYBLOB="19000000000000001c0012000c00010062726964676500000c0002000800050001"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x2e, &(0x7f0000000040)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0xa, 0x0, r2}, [@IFLA_MASTER={0x8, 0xa, r5}]}, 0x28}}, 0x0) 18:59:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a0a8802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:50 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x590, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0xd8, 0x120, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5f0) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') [ 1469.269867] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1469.274319] IPv6: ADDRCONF(NETDEV_UP): bridge2: link is not ready [ 1469.277899] EXT4-fs (loop3): Invalid log cluster size: 1946157056 [ 1469.321186] device macvlan0 left promiscuous mode [ 1469.332251] bridge1: port 1(macvlan0) entered disabled state [ 1469.377260] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1469.388398] EXT4-fs (loop3): Invalid log cluster size: 1946157056 [ 1469.410769] bridge2: port 1(macvlan0) entered blocking state [ 1469.417670] bridge2: port 1(macvlan0) entered disabled state [ 1469.424409] device macvlan0 entered promiscuous mode [ 1469.432199] bridge2: port 1(macvlan0) entered blocking state [ 1469.438190] bridge2: port 1(macvlan0) entered listening state 18:59:51 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="2275000048000000f3ff000000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0x0) 18:59:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a258802a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:51 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x658, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1a0, 0x1e8, 0x0, {}, [@common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6b8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') 18:59:51 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'macvlan0\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0xfffffffffffffecd, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=r5, @ANYBLOB="19000000000000001c0012000c00010062726964676500000c0002000800050001"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x2e, &(0x7f0000000040)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0xa, 0x0, r2}, [@IFLA_MASTER={0x8, 0xa, r5}]}, 0x28}}, 0x0) [ 1469.620991] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1469.630911] EXT4-fs (loop3): Invalid log cluster size: 1946157056 [ 1469.660503] IPv6: ADDRCONF(NETDEV_UP): bridge3: link is not ready [ 1469.703597] device macvlan0 left promiscuous mode 18:59:51 executing program 1: timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r0 = syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x0, 0x0) r1 = getpid() ioctl$MON_IOCX_MFETCH(r0, 0x40189206, &(0x7f00000001c0)={0x0}) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) preadv(r0, &(0x7f0000000100)=[{&(0x7f00000002c0)=""/158, 0x9e}], 0x1, 0x0, 0x0) tkill(r1, 0x800000015) 18:59:51 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x658, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1a0, 0x1e8, 0x0, {}, [@common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6b8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') 18:59:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548803a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) [ 1469.726673] bridge2: port 1(macvlan0) entered disabled state [ 1469.771582] bridge3: port 1(macvlan0) entered blocking state [ 1469.790335] bridge3: port 1(macvlan0) entered disabled state [ 1469.807038] device macvlan0 entered promiscuous mode [ 1469.810159] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1469.814310] bridge3: port 1(macvlan0) entered blocking state [ 1469.825749] bridge3: port 1(macvlan0) entered listening state [ 1469.859321] EXT4-fs (loop3): Invalid log cluster size: 1946157056 [ 1469.938300] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1469.947162] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:51 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6, @rand_addr, 0xff000000}, 0x1c) 18:59:51 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x658, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1a0, 0x1e8, 0x0, {}, [@common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6b8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') 18:59:51 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'macvlan0\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0xfffffffffffffecd, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=r5, @ANYBLOB="19000000000000001c0012000c00010062726964676500000c0002000800050001"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x2e, &(0x7f0000000040)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0xa, 0x0, r2}, [@IFLA_MASTER={0x8, 0xa, r5}]}, 0x28}}, 0x0) 18:59:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548804a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:51 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, &(0x7f0000000180)=0x10) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x7c, &(0x7f0000000080)={r4}, &(0x7f00000000c0)=0x18) [ 1470.231054] IPv6: ADDRCONF(NETDEV_UP): bridge4: link is not ready [ 1470.261517] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1470.261545] device macvlan0 left promiscuous mode [ 1470.291155] bridge3: port 1(macvlan0) entered disabled state [ 1470.317702] EXT4-fs (loop3): Invalid log cluster size: 1946157056 [ 1470.347172] bridge4: port 1(macvlan0) entered blocking state [ 1470.354304] bridge4: port 1(macvlan0) entered disabled state [ 1470.363642] device macvlan0 entered promiscuous mode [ 1470.370327] bridge4: port 1(macvlan0) entered blocking state [ 1470.376286] bridge4: port 1(macvlan0) entered listening state 18:59:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SOUND_MIXER_READ_CAPS(r1, 0x80044dfc, &(0x7f0000000080)) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000040)="2275000048000000f3ff000000000000", 0x10) r5 = accept4(r4, 0x0, 0x0, 0x0) splice(r2, 0x0, r5, 0x0, 0x30007, 0x0) 18:59:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548807a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:52 executing program 1: mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) socket(0x10, 0x803, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:59:52 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(0x0, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') 18:59:52 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x0, 0x0) 18:59:52 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(0x0, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') [ 1470.502028] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1470.508883] xt_check_table_hooks: 4 callbacks suppressed [ 1470.508891] x_tables: duplicate underflow at hook 1 [ 1470.520675] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:52 executing program 4: mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) [ 1470.560999] x_tables: duplicate underflow at hook 1 [ 1470.590515] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1470.599929] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:52 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6, @rand_addr, 0xff0f0000}, 0x1c) 18:59:52 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(0x0, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') 18:59:52 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x402, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x300cce, &(0x7f0000000000)=ANY=[], 0x0) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) 18:59:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548809a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:52 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') [ 1471.173066] x_tables: duplicate underflow at hook 1 [ 1471.183970] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1471.197169] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:52 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)) 18:59:52 executing program 1: timer_create(0x0, &(0x7f0000000000)={0x0, 0x400014}, &(0x7f0000000340)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$inet(0x2, 0x2, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$inet(0x2, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r5) ioctl$VIDIOC_G_EXT_CTRLS(r3, 0xc0205647, &(0x7f0000000280)={0x9a0000, 0x200, 0xffffffff, r5, 0x0, &(0x7f0000000240)={0xa00965, 0x401, [], @string=&(0x7f00000000c0)=0xaf}}) getsockopt$TIPC_GROUP_JOIN(r6, 0x10f, 0x87, &(0x7f00000002c0), &(0x7f0000000300)=0x4) timer_gettime(r0, &(0x7f0000000000)) r7 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r7, 0x10e, 0x1, &(0x7f0000000080)=0x9, 0x4) sendmsg$nl_generic(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x28, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}, [@typed={0x14, 0xc}]}, 0x28}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r7, 0x10e, 0x2, &(0x7f0000000140)=0x5, 0x4) r8 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$KDGKBLED(r8, 0xc0045405, &(0x7f0000a07fff)) [ 1471.270755] x_tables: duplicate underflow at hook 1 [ 1471.280014] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1471.293383] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:52 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') 18:59:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548810a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:52 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 18:59:53 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$netlink(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r2, 0x10e, 0x2, &(0x7f00000000c0)=0x12, 0x4) recvmmsg(r2, &(0x7f0000002340)=[{{&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @local}}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000380)=""/186, 0xba}, {&(0x7f0000000540)=""/224, 0xe0}, {&(0x7f0000000640)=""/106, 0x6a}], 0x3, &(0x7f00000006c0)=""/59, 0x3b}}, {{&(0x7f0000000700)=@nfc, 0x80, &(0x7f0000001ac0)=[{0x0}, {&(0x7f0000001780)=""/137, 0x89}, {&(0x7f0000001840)=""/52, 0x34}, {&(0x7f0000001880)=""/241, 0xf1}, {&(0x7f0000001980)=""/40, 0x28}, {&(0x7f00000019c0)=""/209, 0xd1}], 0x6, &(0x7f0000001b40)=""/240, 0xf0}, 0x2}, {{&(0x7f0000001c40)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000002000)=[{&(0x7f0000001cc0)=""/102, 0x66}, {&(0x7f0000001d40)=""/230, 0xe6}, {&(0x7f0000001e40)=""/51, 0x33}, {&(0x7f0000001e80)=""/93, 0x5d}, {&(0x7f0000001f00)=""/43, 0x2b}, {&(0x7f0000001f40)=""/42, 0x2a}, {&(0x7f0000001f80)=""/45, 0x2d}, {&(0x7f0000001fc0)=""/51, 0x33}], 0x8}, 0x994f}, {{&(0x7f0000002080)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000002240)=[{&(0x7f0000002100)=""/142, 0x8e}, {&(0x7f00000021c0)=""/52, 0x34}], 0x2, &(0x7f0000002280)=""/144, 0x90}, 0x800}], 0x4, 0x10002, 0x0) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0)='ethtool\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000440)={0x44, r3, 0x400, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x18, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x10, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}]}, 0x44}}, 0x0) sendmsg$ETHTOOL_MSG_WOL_GET(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, r3, 0x0, 0x70bd29, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x4041}, 0x840) sendmsg$ETHTOOL_MSG_DEBUG_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000440)={&(0x7f0000000140)={0x2d4, r3, 0x2, 0x70bd2d, 0x25dfdbfd, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0xc, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x2b4, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x88, 0x4, "89013efbc8a0968ffcba2274f0576d8ad88847316a3015ab43b9719c4962d4325fe7cfb4495e610cad56c8007504ba009378d7443fe85b968f28d584e075f2b6a07f5c612a6f13acbcd6fc65198f46be6f14fdeb85bfeadc0cd8fe5d17f6a462819f872dd5d8b2544461932dc3f257f0e6c1821d14060bb0811845464166db94b43778a9"}, @ETHTOOL_A_BITSET_BITS={0xa0, 0x3, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3f}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}]}, {0x70, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x18, 0x2, 'vmac64(aes-generic)\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x18, 0x2, 'vmac64(aes-generic)\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x18, 0x2, 'vmac64(aes-generic)\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x18, 0x2, 'vmac64(aes-generic)\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_VALUE={0x7c, 0x4, "1f4f2f24f8da5dfc05ed2728931a33b96f025baad7c6e966e6140b4ba65d4303ccc54b615933f038c11a29b60fc548b4549a6bc6403de439771d3065e0700ef092c6701cc5e6c0e0481b853ee6d95bcc770c2dec6a763bcdb35f0e996d3577da5bc5a934e3e2f85fe682ef2f46fc38a70e1da13eb26aef60"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0x39, 0x4, "1c525219764a007aef9f295e33159ebd498b083af25f01f95105df43de68468c49b2a871591efb723ef2c3b1d63fc1f0bf89f2bd17"}, @ETHTOOL_A_BITSET_BITS={0xcc, 0x3, 0x0, 0x1, [{0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8001}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '\xf4\'$\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x18, 0x2, 'vmac64(aes-generic)\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%#.-\'![\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x10000}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, 'N^%\x00'}]}, {0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '%\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'hash\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x18, 0x2, 'vmac64(aes-generic)\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, ']\xbe\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7f}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}]}]}]}]}, 0x2d4}, 0x1, 0x0, 0x0, 0x4000800}, 0x80) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000000040)="2275000048000000f3ff000000000000", 0x10) r6 = accept4(r5, 0x0, 0x0, 0x0) splice(r0, 0x0, r6, 0x0, 0x30007, 0x0) r7 = socket$inet_udplite(0x2, 0x2, 0x88) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$SNDCTL_DSP_GETOPTR(r8, 0x800c5012, &(0x7f0000000080)) [ 1471.427883] x_tables: duplicate underflow at hook 1 18:59:53 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r1, 0x4200, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffb) sendfile(r0, r0, 0x0, 0x8080ffffff7e) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r5, &(0x7f0000000000)=ANY=[], 0x4240a543) ioctl$RNDCLEARPOOL(r5, 0x5206, &(0x7f00000000c0)=0x600000) openat$cgroup_netprio_ifpriomap(r5, &(0x7f0000000100)='net_prio.ifpriomap\x00', 0x2, 0x0) [ 1471.490136] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1471.534011] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1471.562160] EXT4-fs (loop3): Invalid log cluster size: 1946157056 [ 1471.588167] audit: type=1804 audit(1595876393.145:505): pid=27529 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir550026038/syzkaller.GUuCiK/1569/bus" dev="sda1" ino=16852 res=1 [ 1471.645183] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1471.667797] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:53 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6, @rand_addr, 0xffffff8d}, 0x1c) 18:59:53 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') 18:59:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548814a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:53 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x10, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') [ 1472.087693] x_tables: duplicate underflow at hook 1 [ 1472.104316] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1472.141405] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a54882da903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:53 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x10, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') [ 1472.209122] x_tables: duplicate underflow at hook 1 18:59:53 executing program 4: madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) pkey_free(0xffffffffffffffff) 18:59:53 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) getpeername$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f00000000c0)=0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="2275000048000000f3ff000000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0x0) [ 1472.350659] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1472.398351] x_tables: duplicate underflow at hook 1 [ 1472.401942] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:54 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x10, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') 18:59:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548845a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:54 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$F2FS_IOC_RELEASE_COMPRESS_BLOCKS(0xffffffffffffffff, 0x8008f512, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfd14) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860ac5cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfed4, 0x20c49a, 0x0, 0x27) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, 0x0, 0x0) 18:59:54 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)={0x58, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,port\x00'}]}, 0x58}}, 0x0) [ 1472.587149] x_tables: duplicate underflow at hook 1 [ 1472.679989] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1472.727139] EXT4-fs (loop3): Invalid log cluster size: 1946157056 [ 1472.793862] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1472.804815] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:54 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6, @rand_addr, 0xffffff91}, 0x1c) 18:59:54 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, 0xffffffffffffffff, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r1 = socket(0x10, 0x8000000803, 0x0) r2 = socket(0x200000000000011, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') 18:59:54 executing program 4: 18:59:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548853a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:54 executing program 4: 18:59:54 executing program 4: [ 1473.011055] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1473.031262] x_tables: duplicate underflow at hook 1 [ 1473.043152] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:54 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, 0xffffffffffffffff, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r1 = socket(0x10, 0x8000000803, 0x0) r2 = socket(0x200000000000011, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') [ 1473.147457] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1473.160134] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:54 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="2275000048000000f3ff000000000000", 0x10) fcntl$getflags(r1, 0xb) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0x0) 18:59:54 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=@bridge_getlink={0x20, 0x12, 0x201}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f00000002c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 18:59:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548863a903000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) [ 1473.352546] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1473.371634] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:55 executing program 1: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, 0x0, &(0x7f0000000040)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$NLBL_MGMT_C_REMOVEDEF(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) pkey_free(0xffffffffffffffff) 18:59:55 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, 0xffffffffffffffff, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r1 = socket(0x10, 0x8000000803, 0x0) r2 = socket(0x200000000000011, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') 18:59:55 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6, @rand_addr, 0xfffffff5}, 0x1c) 18:59:55 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f00000000c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:59:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a902000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:55 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x0, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') 18:59:55 executing program 1: 18:59:55 executing program 1: 18:59:55 executing program 4: [ 1473.900890] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1473.930948] EXT4-fs (loop3): Invalid log cluster size: 1946157056 [ 1474.028550] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1474.036379] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:55 executing program 1: 18:59:55 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x0, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') 18:59:55 executing program 4: 18:59:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a904000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:55 executing program 4: [ 1474.277616] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1474.326044] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:56 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x17) 18:59:56 executing program 1: 18:59:56 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x0, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') 18:59:56 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket(0x1000000010, 0x80002, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000000000800", @ANYRES32=r6, @ANYBLOB="00000000000000f3280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000002400ffffff7f000000003c0005000000", @ANYRES32=r6, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=ANY=[@ANYBLOB="540000002c00270e00"/20, @ANYRES32=r6, @ANYBLOB="00000000000000000300000009000100666c6f77000000002400020020000b8008000100018000001400028010"], 0x54}}, 0x0) sendmmsg$alg(r3, &(0x7f0000000200), 0x10efe10675dec16, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="2275000048000000f3ff000000000000", 0x10) accept4(r2, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000080)={0x21, @time={0x2, 0x6d}, 0x50, {0x5, 0x1}, 0x8, 0x2, 0x1}) r7 = msgget$private(0x0, 0x0) msgsnd(r7, &(0x7f0000000340)={0x3}, 0x2000, 0x0) msgctl$IPC_RMID(r7, 0x0) 18:59:56 executing program 4: 18:59:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a906000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:56 executing program 4: 18:59:56 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x20b64000) 18:59:56 executing program 1: 18:59:56 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, 0x0, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') [ 1474.823131] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1474.855910] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 18:59:56 executing program 4: [ 1474.879519] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:56 executing program 1: [ 1474.969544] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1474.998400] EXT4-fs (loop3): Invalid log cluster size: 1946157056 18:59:56 executing program 4: 18:59:56 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x68001) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x41c1, 0x2000, 0xd728ba3124066338, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2}, 0x40000, 0x40, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000080)={'netdevsim0\x00', {0x2, 0x4e24, @private=0xa010100}}) writev(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r4) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x240080, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) dup(r6) flock(r3, 0x8) sendto$inet6(r2, &(0x7f0000000100)="7f2605bc112cd79d987af6c804bd39acd6b1fa6fba110585cb5f0f0100000000000000216700e40b2225d22c27cfd1168191d21a41d56392c888a2a2f2eb8f8ebf1b5abf77f96885d761e8467ad31da4c983945092f03620264d27897fe717d5841ee287b4d22375328d03552dc64818abd4f2305b71332bf436f2a366000efef073e42b0045128b5c20c948c4827f59c7c2c6e15502", 0x96, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6, @private2={0xfc, 0x2, [], 0x1}}, 0x1c) 18:59:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a907000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) [ 1475.170273] EXT4-fs (loop3): Unsupported filesystem blocksize 131072 (7 log_block_size) [ 1475.224078] EXT4-fs (loop3): Unsupported filesystem blocksize 131072 (7 log_block_size) 18:59:57 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="2275000048000000f3ff000000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r5, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x64, r6, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x400}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x7}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1f}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_SECRET={0x14, 0x4, [0xfffffffd, 0x8, 0xd2, 0x3ff]}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x9}]}, 0x64}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 18:59:57 executing program 4: 18:59:57 executing program 1: 18:59:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a90a000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:57 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, 0x0, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') 18:59:57 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x3fd6, 0x460003) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000001280)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$CAN_RAW_JOIN_FILTERS(0xffffffffffffffff, 0x65, 0x6, &(0x7f0000001100), &(0x7f0000001140)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000001380), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$ax25(r2, &(0x7f0000000080)="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", 0x1000, 0x1, &(0x7f0000001080)={{0x3, @default, 0x2}, [@null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f00000013c0)=ANY=[@ANYBLOB="892a000000000000040000000304cf1f4ebf95997fa354aeebe7a2f1fc742711451f4c8fa5103735da685cdd91141433f572befe285304c559bb54a74459bd7ba7f408514f631a32a90b6aa15e498d067644b84949a8971ebbdeb21b028d5e2b96de76b82fe093e4a71b1d8ed121c0d60baf1319931c8d50d970f0cb6bf1e2eef356e23df62ace4df3478aa4a271b10c2b583c60f7495f18201e93a336e00baa72b75b260edebeec492c70e23b856b6f26f5a0cb7afba4d37c2c42bedfaf5b61db9a3d2a8c7e9ce08a156a7f813c756ccf1ff6c482b16b26a54797c97fd4210700000000000000c910fc0000000000000000000000000000000738000000000c7fff010000010000000000000000000000000005000000000000008000000000000000ff7f0000000000000600000000000000040164c910fc020000000000000000000000000001c91000000000000000000000ffffe00000020502000100bd28b8256e35720a7665363b87f2365b6eab7e8ca4ad18a0b105d600"], 0x160) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) fsync(r2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) 18:59:57 executing program 4: 18:59:57 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, 0x0, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') 18:59:57 executing program 1: [ 1475.629767] xt_check_table_hooks: 6 callbacks suppressed [ 1475.629776] x_tables: duplicate underflow at hook 1 [ 1475.663878] EXT4-fs (loop3): Unsupported filesystem blocksize 1048576 (10 log_block_size) 18:59:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a910000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) [ 1475.752084] x_tables: duplicate underflow at hook 1 18:59:57 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') 18:59:57 executing program 4: [ 1475.873954] EXT4-fs (loop3): Unsupported filesystem blocksize 67108864 (16 log_block_size) [ 1475.887696] x_tables: duplicate underflow at hook 1 [ 1475.943650] EXT4-fs (loop3): Unsupported filesystem blocksize 67108864 (16 log_block_size) 18:59:58 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = inotify_init1(0x0) fcntl$setown(r3, 0x8, 0xffffffffffffffff) fcntl$getownex(r3, 0x10, &(0x7f0000000080)={0x0, 0x0}) setpgid(0x0, r4) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x8, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x2}, 0x0, 0x6, 0x0, 0x3, 0x0, 0x1}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000880)={0x0, 0x1, 0x3013}) r5 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f00000011c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000380)="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", 0x4e2, r5) add_key(&(0x7f00000002c0)='id_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f00000009c0)="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", 0x1000, r5) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="2275000048000000f3ff000000000000", 0x10) r6 = accept4(r2, 0x0, 0x0, 0x0) lstat(&(0x7f0000000100)='./file0/../file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000040)='./file0\x00', r7, 0x0) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x80, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="66b5c4c59ef3259636855d5b4016105af26d190cabc624919aa4cf44b9e1250e3c362db496e7a2b6fb87fdaf5ab9ec5ca4", 0x31, 0xffffffffffffffff}, {&(0x7f0000000180)="f0e11e8f069162e286fad4241718ae821a06bbc97be46f4754186ea514156d7a47302ffdb1e086c88f660a13c7a375b6a2a949ba7bde6a9b6ff7bc4e4d7d1985f262b6b156a2c632c25e65df4b51ed4d86eb56cf277966db41e85c3f0dbb91d3cc2816aa53cd", 0x66, 0x1}], 0x10000, &(0x7f0000000240)={[{@acl='acl'}, {@user_xattr='user_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@euid_eq={'euid', 0x3d, r7}}]}) splice(r0, 0x0, r6, 0x0, 0x30007, 0x0) 18:59:58 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') 18:59:58 executing program 1: 18:59:58 executing program 4: 18:59:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a914000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:58 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x2, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, &(0x7f0000f6f000), 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6, @remote}, 0x1c) 18:59:58 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') [ 1476.527257] x_tables: duplicate underflow at hook 1 18:59:58 executing program 4: 18:59:58 executing program 1: 18:59:58 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x4e8043) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) [ 1476.598368] EXT4-fs (loop3): Unsupported filesystem blocksize 1073741824 (20 log_block_size) [ 1476.653321] x_tables: duplicate underflow at hook 1 18:59:58 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') [ 1476.683611] erofs: read_super, device -> /dev/loop2 18:59:58 executing program 4: [ 1476.717642] erofs: options -> acl,user_xattr,fsmagic=0x000000000000001f,euid=00000000000000000000, [ 1476.755042] erofs: cannot find valid erofs superblock [ 1476.802473] x_tables: duplicate underflow at hook 1 18:59:58 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="2275000048000000f3ff000000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$BLKTRACESTOP(r5, 0x1275, 0x0) 18:59:58 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') 18:59:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a92d000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:58 executing program 1: 18:59:58 executing program 4: 18:59:59 executing program 1: 18:59:59 executing program 4: 18:59:59 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') [ 1477.442841] EXT4-fs (loop3): Unsupported filesystem blocksize 8388608 (45 log_block_size) [ 1477.471394] x_tables: duplicate underflow at hook 1 18:59:59 executing program 1: [ 1477.527486] EXT4-fs (loop3): Unsupported filesystem blocksize 8388608 (45 log_block_size) [ 1477.614272] x_tables: duplicate underflow at hook 1 18:59:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a945000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:59 executing program 4: 18:59:59 executing program 1: [ 1477.750236] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1477.775951] EXT4-fs (loop3): Invalid log block size: 69 [ 1477.826142] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1477.833642] EXT4-fs (loop3): Invalid log block size: 69 18:59:59 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000080)={{{@in=@empty, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0xe8) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f00000001c0)={r5, 0x1, 0x6, @remote}, 0x10) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="2275000048000000f3ff000000000000", 0x10) r6 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r6, 0x0, 0x30007, 0x0) 18:59:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a953000000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 18:59:59 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, 0x0) r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') 18:59:59 executing program 4: 18:59:59 executing program 1: 18:59:59 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080)='NLBL_UNLBL\x00') ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f0000000200)=0x6) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) connect$rds(r4, &(0x7f0000000240)={0x2, 0x4e24, @local}, 0x10) setuid(0xee01) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r2, 0x0, 0x70bd25, 0x0, {}, [@NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @remote}]}, 0x1c}}, 0x4) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x1c, r2, 0x8, 0x0, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) 18:59:59 executing program 4: 18:59:59 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, 0x0) r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') [ 1478.376691] x_tables: duplicate underflow at hook 1 19:00:00 executing program 1: [ 1478.429568] EXT4-fs (loop3): Unsupported filesystem blocksize 536870912 (83 log_block_size) 19:00:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a923020000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 19:00:00 executing program 4: [ 1478.533062] x_tables: duplicate underflow at hook 1 19:00:00 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, 0x0) r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') [ 1478.668810] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1478.676846] EXT4-fs (loop3): Invalid log block size: 547 [ 1478.729880] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1478.740111] EXT4-fs (loop3): Invalid log block size: 547 19:00:00 executing program 4: 19:00:00 executing program 1: 19:00:00 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x0, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') 19:00:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a9d0030000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 19:00:00 executing program 5: flock(0xffffffffffffffff, 0x1) syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) 19:00:00 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="2275000048000000f3ff000000000000", 0x10) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) r7 = socket$inet_udplite(0x2, 0x2, 0x88) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) setsockopt(r8, 0x7, 0x9, &(0x7f0000000140)="d07876ff86def3519abe313e9ab8e5b1c3b6ef6023053eeff65df7dec7265f491989e8adc88b8242d32d5b06dedb5bc5e3b88a39eb68dc50c0b2274300dbdac4eb0d74a0a588", 0x46) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$TIPC_GROUP_JOIN(r6, 0x10f, 0x87, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$P9_RLCREATE(r4, &(0x7f0000000080)={0x18, 0xf, 0x2, {{0x80, 0x0, 0x7}, 0x7}}, 0x18) r9 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r9, 0x0, 0x30007, 0x0) 19:00:00 executing program 1: 19:00:00 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x0, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') 19:00:00 executing program 4: [ 1479.391880] EXT4-fs (loop3): Unsupported filesystem blocksize 67108864 (976 log_block_size) 19:00:01 executing program 1: 19:00:01 executing program 4: [ 1479.454513] EXT4-fs (loop3): Unsupported filesystem blocksize 67108864 (976 log_block_size) 19:00:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a900420000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 19:00:01 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x0, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') 19:00:01 executing program 1: 19:00:01 executing program 4: [ 1479.632780] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1479.649600] EXT4-fs (loop3): Invalid log block size: 16896 19:00:01 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x0, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') [ 1479.710097] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1479.736162] EXT4-fs (loop3): Invalid log block size: 16896 [ 1479.865240] bridge1: port 1(macvlan0) entered learning state 19:00:01 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000080), &(0x7f00000000c0)=0x4) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) 19:00:01 executing program 1: 19:00:01 executing program 4: 19:00:01 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x0, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') 19:00:01 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) ioctl$DRM_IOCTL_MODE_SETPROPERTY(r0, 0xc01064ab, &(0x7f0000000080)={0x3, 0xb4d, 0x1}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x3000007, 0x810, r0, 0xd07a4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="2275000048000000f3ff000000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0x0) 19:00:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903020000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 19:00:01 executing program 4: 19:00:01 executing program 1: 19:00:01 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x0, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') [ 1480.238444] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1480.277446] EXT4-fs (loop3): Invalid log block size: 515 [ 1480.326812] audit: type=1400 audit(1595876401.885:506): avc: denied { execute } for pid=28027 comm="syz-executor.2" path="pipe:[184933]" dev="pipefs" ino=184933 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=fifo_file permissive=1 19:00:01 executing program 1: 19:00:02 executing program 4: [ 1480.373869] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1480.394888] EXT4-fs (loop3): Invalid log block size: 515 19:00:02 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x0, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') 19:00:02 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x68001) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000300)=""/79) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_genetlink_get_family_id$devlink(&(0x7f00000000c0)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_SET(r2, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000000380)={0xcc, r3, 0x4, 0x70bd27, 0x25dfdbfd, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x6, 0x4, 0x1}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x6}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x6, 0x4, 0x2}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}, {0x6, 0x4, 0x2}}]}, 0xcc}, 0x1, 0x0, 0x0, 0x800}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$USBDEVFS_CONNECTINFO(r0, 0x40085511, &(0x7f0000000100)) writev(0xffffffffffffffff, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) socket$inet_udplite(0x2, 0x2, 0x88) r5 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x40, 0x101000) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r5, 0x800443d3, &(0x7f00000002c0)={@fixed={[], 0x11}, 0x8000, 0x8}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$F2FS_IOC_WRITE_CHECKPOINT(0xffffffffffffffff, 0xf507, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r4, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) 19:00:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903030000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 19:00:02 executing program 4: 19:00:02 executing program 1: 19:00:02 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCRSSCAUSE(r2, 0x89e1, &(0x7f0000000200)=0x1a2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000040)="2275000048000000f3ff000000000000", 0x10) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x6800, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) syz_kvm_setup_cpu$x86(r4, r6, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000140)=[@text32={0x20, &(0x7f00000000c0)="b9c2080000b841000000ba000000000f300f32b8000000000f23d00f21f835300000070f23f80f01d10f01c5b8edb83f540f23d80f21f835400000100f23f80f01c58fe9f812cb0fc77cdb0066baf80cb8780c6c83ef66bafc0ced", 0x5b}], 0x1, 0x7f, &(0x7f0000000180)=[@vmwrite={0x8, 0x0, 0x8, 0x0, 0x2, 0x0, 0x2, 0x0, 0x3ff}, @dstype3={0x7, 0xf}], 0x2) r7 = accept4(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r7, 0x0, 0x30007, 0x0) 19:00:02 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x0, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') 19:00:02 executing program 4: 19:00:02 executing program 1: [ 1481.126120] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1481.154788] EXT4-fs (loop3): Invalid log block size: 771 19:00:02 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x0, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') 19:00:02 executing program 4: [ 1481.184438] xt_check_table_hooks: 8 callbacks suppressed [ 1481.184447] x_tables: duplicate underflow at hook 1 [ 1481.211427] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem 19:00:02 executing program 1: [ 1481.235717] EXT4-fs (loop3): Invalid log block size: 771 19:00:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903040000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) [ 1481.330667] x_tables: duplicate underflow at hook 1 [ 1481.418501] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1481.426359] EXT4-fs (loop3): Invalid log block size: 1027 [ 1481.459515] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1481.467240] EXT4-fs (loop3): Invalid log block size: 1027 19:00:03 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$AUDIT_DEL_RULE(r4, &(0x7f0000000780)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000740)={&(0x7f0000000300)={0x428, 0x3f4, 0x400, 0x70bd29, 0x25dfdbfe, {0x0, 0x2, 0x18, [0x7, 0x7cf, 0x5, 0x9, 0x100, 0x47312eba, 0x0, 0x4, 0x3, 0xfffffff8, 0x1, 0x5, 0x8, 0xffffffff, 0xfffffffe, 0x7, 0x4, 0x800, 0x6, 0x7, 0x4, 0x3, 0x2, 0xfff, 0x4, 0x7fffffff, 0x8, 0x1, 0x93c, 0x0, 0x9, 0x1312a847, 0x3, 0x2, 0x42f4, 0x4, 0x9, 0x2, 0x80, 0x7, 0x3, 0x6, 0x3ff, 0x7, 0x0, 0x7, 0x3f, 0x7, 0x80000000, 0x3, 0x9, 0x1000, 0x3f, 0xfffffff7, 0x2, 0x1, 0x9, 0x3, 0x101, 0x40, 0x2, 0x9, 0x6, 0x4], [0x421, 0x0, 0x7, 0xb9c, 0x0, 0x200, 0x401, 0x1f, 0x8, 0x9, 0x8000000, 0xfffffffc, 0x1, 0x20a, 0x7f, 0x4, 0x3ff, 0x4, 0x49cb, 0x9, 0x401, 0x6, 0x2, 0x40, 0x5, 0x7fffffff, 0x5, 0x0, 0x3ff, 0x2, 0x6, 0x6, 0x1, 0x6, 0x4cd, 0x7, 0x3fe8, 0x5, 0x7, 0x1, 0x2, 0xfffffff9, 0x7ff, 0x2, 0x3, 0x0, 0x80, 0x6, 0x1, 0x0, 0x0, 0xc12b, 0x3a0, 0xfffff001, 0x0, 0x7b3c, 0x6, 0x2, 0x9, 0x32a0, 0xfff, 0xc62, 0x7d, 0x10001], [0x1f, 0x2, 0x7ff, 0x1, 0x2, 0x4, 0x1, 0x54e, 0x1, 0x20, 0x9, 0x6, 0x8000, 0x1ff, 0x7, 0x4, 0x6, 0x3, 0x7, 0x989, 0x2, 0x4, 0xff, 0x4, 0x7fffffff, 0x4, 0x5, 0x8, 0x73, 0x7f, 0x6, 0xd71, 0x5, 0x8, 0x2, 0x4e, 0x3, 0x8, 0x7, 0xbec, 0x7ff, 0x5, 0x9, 0x3, 0xffffffff, 0x400, 0x2, 0x3, 0x4, 0xffff, 0x4, 0xea60, 0xffffffe0, 0x4, 0x8, 0x98b, 0x7, 0x96, 0x5, 0x5, 0x10000, 0x8, 0x8, 0x2], [0x7, 0x80, 0x3, 0x8000, 0x8, 0x40, 0x89, 0x1, 0x340, 0x80000001, 0x2, 0x0, 0xffffffff, 0x6, 0x0, 0xffffffaa, 0x0, 0x7, 0x3, 0x9173, 0xfffffffc, 0x8, 0x3f, 0x3, 0x10001, 0x4000, 0x3, 0x0, 0x8, 0x3, 0x1, 0x4, 0x5b, 0x4976, 0x3, 0x58c, 0x3, 0x80000000, 0xf6e, 0x8, 0x9, 0x10001, 0xfff, 0xf2, 0x266cc5f4, 0xfe76, 0x4, 0x2, 0x6a, 0x4, 0x5, 0x1fffe00, 0x2, 0x182d, 0x4, 0x2c, 0x6, 0x2e3, 0x4, 0x101, 0x9, 0x0, 0x920f], 0x5, ['\x00', '&@\x00', '\x00']}, ["", ""]}, 0x428}, 0x1, 0x0, 0x0, 0x4c081}, 0x4) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r2, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8010}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)={0x104, r5, 0x100, 0x70bd2b, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x32}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x67}]}, @IPVS_CMD_ATTR_SERVICE={0x30, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'dh\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x6}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@private=0xa010100}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_DAEMON={0x5c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'macvlan0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bridge0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'geneve0\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1f}]}, 0x104}, 0x1, 0x0, 0x0, 0x2800}, 0xc000) writev(0xffffffffffffffff, 0x0, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000007c0)=0x6) bind$inet6(r6, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r6, &(0x7f0000f6f000), 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0xa}, 0x1c) 19:00:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903050000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 19:00:03 executing program 1: 19:00:03 executing program 4: [ 1481.977563] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1481.986676] EXT4-fs (loop3): Invalid log block size: 1283 [ 1482.058652] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1482.075582] EXT4-fs (loop3): Invalid log block size: 1283 19:00:03 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000100)) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="2275000048000000f3ff000000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x7f, 0xc00) ioctl$FS_IOC_GETFLAGS(r4, 0x80086601, &(0x7f00000000c0)) splice(r0, 0x0, r3, 0x0, 0x30007, 0x0) 19:00:03 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') 19:00:03 executing program 4: 19:00:03 executing program 1: 19:00:03 executing program 4: 19:00:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903060000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) [ 1482.225424] x_tables: duplicate underflow at hook 1 19:00:03 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') 19:00:03 executing program 1: [ 1482.315530] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1482.347593] EXT4-fs (loop3): Invalid log block size: 1539 [ 1482.402533] x_tables: duplicate underflow at hook 1 [ 1482.423691] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1482.431738] EXT4-fs (loop3): Invalid log block size: 1539 19:00:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903070000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 19:00:04 executing program 4: 19:00:04 executing program 1: 19:00:04 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') [ 1482.867957] x_tables: duplicate underflow at hook 1 [ 1482.887826] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1482.911431] EXT4-fs (loop3): Invalid log block size: 1795 [ 1482.968600] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1482.987129] EXT4-fs (loop3): Invalid log block size: 1795 19:00:04 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="2275000048000000f3ff000000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0x0) 19:00:04 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x68001) r0 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x80000000000041c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$inet6(r3, &(0x7f0000000080)={0xa, 0x2, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0xffffffa3}, 0x1c) perf_event_open(&(0x7f00000001c0)={0x3, 0x70, 0x1, 0x6, 0x0, 0x8, 0x0, 0xf3, 0x7550acda4b32fb63, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x2, @perf_bp={&(0x7f0000000180)}, 0x80, 0x5, 0x6e4801a2, 0x8, 0x8, 0x52a2, 0x1}, r0, 0x10, 0xffffffffffffffff, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) write$P9_ROPEN(r7, &(0x7f00000000c0)={0x18, 0x71, 0x2, {{0x8, 0x3}, 0xff}}, 0x18) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x101, 0x45, &(0x7f0000000240)="318440a3daf26188cf99630d3479828c1ac4643fe654308a67c1f5dfd5e67bf4965621b23c050bb92b8d0eb558667f1885729027cbe22a1d00f42924a7bd9e41e1e3a272d4", 0x6, 0xa5, 0x5, 0x9, 0x3, 0x1, 0x3, 'syz1\x00'}) ioctl$SIOCPNENABLEPIPE(r5, 0x89ed, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) 19:00:04 executing program 1: 19:00:04 executing program 4: 19:00:04 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) socket(0x200000000000011, 0x3, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') 19:00:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903090000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) [ 1483.173076] x_tables: duplicate underflow at hook 1 19:00:04 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) socket(0x200000000000011, 0x3, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') 19:00:04 executing program 1: 19:00:04 executing program 4: [ 1483.252731] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem 19:00:04 executing program 1: [ 1483.298840] EXT4-fs (loop3): Invalid log block size: 2307 19:00:04 executing program 4: [ 1483.363337] x_tables: duplicate underflow at hook 1 19:00:04 executing program 1: [ 1483.391477] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1483.402634] EXT4-fs (loop3): Invalid log block size: 2307 19:00:05 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = accept4$tipc(0xffffffffffffffff, &(0x7f0000000080)=@id, &(0x7f00000000c0)=0x10, 0x800) ioctl$sock_inet_SIOCSIFDSTADDR(r3, 0x8918, &(0x7f0000000100)={'veth1_macvtap\x00', {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="2275000048000000f3ff000000000000", 0x10) r4 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x30007, 0x0) 19:00:05 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) socket(0x200000000000011, 0x3, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') 19:00:05 executing program 1: 19:00:05 executing program 4: 19:00:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903100000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 19:00:05 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x44243, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) 19:00:05 executing program 1: [ 1484.066331] x_tables: duplicate underflow at hook 1 19:00:05 executing program 4: 19:00:05 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') socket(0x10, 0x8000000803, 0x0) r2 = socket(0x200000000000011, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') [ 1484.120487] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1484.128402] EXT4-fs (loop3): Invalid log block size: 4099 19:00:05 executing program 1: [ 1484.188216] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1484.213824] EXT4-fs (loop3): Invalid log block size: 4099 [ 1484.243863] x_tables: duplicate underflow at hook 1 19:00:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903220000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 19:00:05 executing program 4: [ 1484.394811] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1484.402415] EXT4-fs (loop3): Invalid log block size: 8707 [ 1484.461299] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1484.468904] EXT4-fs (loop3): Invalid log block size: 8707 19:00:06 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) prctl$PR_SET_DUMPABLE(0x4, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x441c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="2275000048000000f3ff000000000000", 0x10) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x30007, 0x0) 19:00:06 executing program 1: 19:00:06 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') socket(0x10, 0x8000000803, 0x0) r2 = socket(0x200000000000011, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') 19:00:06 executing program 4: 19:00:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903230000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 19:00:06 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) 19:00:06 executing program 1: 19:00:06 executing program 4: 19:00:06 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') socket(0x10, 0x8000000803, 0x0) r2 = socket(0x200000000000011, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') [ 1485.010252] x_tables: duplicate underflow at hook 1 [ 1485.012982] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1485.048646] EXT4-fs (loop3): Invalid log block size: 8963 19:00:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a9032c0000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 19:00:06 executing program 1: 19:00:06 executing program 4: [ 1485.242775] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1485.272703] EXT4-fs (loop3): Invalid log block size: 11267 [ 1485.343033] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1485.354999] EXT4-fs (loop3): Invalid log block size: 11267 [ 1485.614680] bridge4: port 1(macvlan0) entered learning state 19:00:07 executing program 1: 19:00:07 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') 19:00:07 executing program 4: 19:00:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a9032d0000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 19:00:07 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') 19:00:07 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) clock_getres(0x6, &(0x7f0000000080)) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) 19:00:07 executing program 4: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000140), 0x14ded905162a6a4b, 0x0, 0x0, 0x429) 19:00:07 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$inet6(r0, &(0x7f0000000d40)={&(0x7f00000007c0)={0xa, 0x0, 0x0, @mcast1}, 0x1c, 0x0, 0x0, &(0x7f0000000c00)=[@dstopts_2292={{0x18}}, @flowinfo={{0x14, 0x29, 0xb, 0x6}}], 0x30}, 0x0) [ 1485.942215] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1485.995936] EXT4-fs (loop3): Invalid log block size: 11523 19:00:07 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x3) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000040)={0x3, {0x3}}) bind$inet6(0xffffffffffffffff, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f00000056c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 19:00:07 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') [ 1486.088926] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1486.125688] EXT4-fs (loop3): Invalid log block size: 11523 19:00:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903480000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) [ 1486.204363] xt_check_table_hooks: 3 callbacks suppressed [ 1486.204372] x_tables: duplicate underflow at hook 1 19:00:07 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r1, {0x2, 0x0, @empty}, 0x2}}, 0x2e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2}, 0x1c) sendmmsg(r0, &(0x7f0000000280)=[{{0x0, 0x700b80b, 0x0, 0x0, 0x0, 0x0, 0xfffffff5}, 0xfffffff5}], 0x400000000000085, 0x0) 19:00:07 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') [ 1486.325209] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1486.351612] EXT4-fs (loop3): Invalid log block size: 18435 [ 1486.383981] x_tables: duplicate underflow at hook 1 19:00:08 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') [ 1486.414978] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1486.428203] EXT4-fs (loop3): Invalid log block size: 18435 19:00:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a9034c0000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) [ 1486.528898] x_tables: duplicate underflow at hook 1 19:00:08 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') [ 1486.623072] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1486.641839] EXT4-fs (loop3): Invalid log block size: 19459 [ 1486.660995] x_tables: duplicate underflow at hook 1 19:00:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903600000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) [ 1486.795636] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1486.803172] EXT4-fs (loop3): Invalid log block size: 24579 19:00:08 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0x40189206, &(0x7f00000001c0)={0x0}) preadv(r0, &(0x7f0000000100)=[{&(0x7f00000002c0)=""/158, 0x9e}], 0x1, 0x0, 0x0) 19:00:08 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, 0x0) 19:00:08 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x82000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0}) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000300)=ANY=[@ANYBLOB="d2"], 0x1) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @local}, &(0x7f0000000000)=0xc) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001c40)={&(0x7f00000002c0)=@newqdisc={0x3c, 0x24, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r8, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8, 0x8, 'tbf\x00'}, {0x10, 0x2, [@TCA_TBF_PRATE64={0x7}]}}]}, 0x3c}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', r8}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r6, 0x40182103, &(0x7f00000000c0)={r7, 0x0, r9, 0x0, 0x80000}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r5, 0x40182103, &(0x7f0000000040)={r7, 0x1, r0, 0x6, 0x80000}) splice(r0, 0x0, r3, 0x0, 0x30007, 0x0) 19:00:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r2, 0x40000000af01, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000002c0)={'\x00', 0x6}) ioctl$VHOST_SET_VRING_ADDR(r2, 0x4028af11, &(0x7f0000000000)={0x0, 0x0, 0x0, &(0x7f0000000400)=""/256, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r2, 0x4008af03, &(0x7f0000001800)={0x6, 0x0, [{0x1000, 0xa7, &(0x7f0000000180)=""/167}, {0x10000, 0xc8, &(0x7f0000000700)=""/200}, {0x4, 0xcb, &(0x7f0000000500)=""/203}, {0x0, 0x0, 0x0}, {0x10000, 0x2, &(0x7f0000000240)=""/2}, {0x100000, 0x1004, &(0x7f0000001940)=""/4100}]}) ioctl$VHOST_NET_SET_BACKEND(r2, 0x4008af30, &(0x7f0000000040)={0x0, r3}) r4 = dup3(r2, r3, 0x0) ioctl$VHOST_NET_SET_BACKEND(r4, 0xaf02, 0x0) 19:00:08 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f00000000c0)=[@in6={0xa, 0x4e22, 0xfffffffc, @dev={0xfe, 0x80, [], 0x38}, 0xfffffff7}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000040)={r4}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000080)=@assoc_value={r4, 0x5}, 0x8) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) [ 1486.876779] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1486.898937] EXT4-fs (loop3): Invalid log block size: 24579 [ 1486.956784] x_tables: duplicate underflow at hook 1 19:00:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903680000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 19:00:08 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, 0x0) 19:00:08 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x688, 0x350, 0x440, 0x350, 0x350, 0x218, 0x5b8, 0x5b8, 0x5e8, 0x5b8, 0x5b8, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'gre0\x00', 'bond_slave_1\x00'}, 0x0, 0x1d0, 0x218, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv4=@empty, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'batadv0\x00', 'gre0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@ipv4={[], [], @multicast1}, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_batadv\x00', 'ip6erspan0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}, {{@uncond, 0x0, 0x130, 0x178, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6e8) r1 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x80000002, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r2 = socket(0x10, 0x8000000803, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, 0x0) [ 1487.111413] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1487.123919] EXT4-fs (loop3): Invalid log block size: 26627 [ 1487.150445] x_tables: duplicate underflow at hook 1 19:00:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a9036c0000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) [ 1487.209026] x_tables: duplicate underflow at hook 1 19:00:08 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r2, 0x0, 0x2e, &(0x7f0000000140)={0x2, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @remote}}}, 0x108) setsockopt$inet_group_source_req(r2, 0x0, 0x2e, &(0x7f0000000640)={0x2, {{0x2, 0x0, @multicast1}}}, 0x108) setsockopt$inet_group_source_req(r2, 0x0, 0x2f, &(0x7f0000000400)={0x100000002, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @remote}}}, 0x108) 19:00:08 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) eventfd(0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/dev\x00') socket$rxrpc(0x21, 0x2, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) [ 1487.238009] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1487.246175] EXT4-fs (loop3): Invalid log block size: 27651 19:00:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903740000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) [ 1487.422522] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1487.430366] EXT4-fs (loop3): Invalid log block size: 29699 19:00:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000080)={0x3, 0x5, 0x2}) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000140)={0x0, 0x5, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "bc4c74c7"}, 0x0, 0x2, @offset=0x400040, 0x10ff00}) 19:00:09 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x800000080004103) 19:00:09 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="895b74e2ed7a32ea79b717bc42c3", 0xe}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 19:00:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a9037a0000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 19:00:09 executing program 5: r0 = socket$tipc(0x1e, 0x2, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f0000000140), &(0x7f0000000180)=0x4) syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x68001) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r1) socket$packet(0x11, 0x3, 0x300) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x0, 0x0) bind$bt_rfcomm(r3, &(0x7f0000000080)={0x1f, @none, 0x2}, 0xa) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r2, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x202000, 0x0) 19:00:09 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="2275000048000000f3ff000000000000", 0x10) lstat(&(0x7f0000000100)='./file0/../file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000040)='./file0\x00', r4, 0x0) syz_mount_image$jfs(&(0x7f0000000240)='jfs\x00', &(0x7f0000000280)='./file0\x00', 0x24e6, 0x3, &(0x7f00000004c0)=[{&(0x7f00000002c0)="b776b43d1d301d43fcd57383b2416d024b35f1e92346a20fa25ec471982ba1d61f14992335f3b133584b16c77906eb63a7118afc5d1b6cab9db8587b8bb9629a96cd71ab7a38c9502a71ac69df1238e38d1bb302cff543ed97", 0x59, 0x6}, {&(0x7f0000000340)="5f02e5d499101d2b17f0df223e312c4af963f12a4d32329060dfda2dca72b86e8f00d5e9d479c023736e3b33f25e727b8e4f1891a1ec84855dec95112b5fd0cd9fce1f468f81f7eeca6465ca64ffa2b11526cdc959f5f6c6031766a166b1fdba865a02f6432722053244d1237dec98ce68a6ec207ae809dfe927b4d64916fcf5954ac42def3bc1e2f16bb7160af25c77a5262e2c5bb5eeba315a260660907ac5fe4d190c4f0af0c49faac845917af5f2d40aa00d47dad22aa6fd36882c0035181cbe7c8ebcc7e3147ac93e5e20b6316fb6c016a820b3017d9980d0b85ceb3fbd7d5172b1e42c5a", 0xe7, 0x2}, {&(0x7f0000000440)="5f1f2dc86d571979cab432a11d1a63f202f06de7578f0f818b9761b64e9b3598dfbf4f88c6e9c7849ff9dd23b0895f22dc252785457d8d596f058f9c1b3bee3a731b56c77a39dee3ad7a94ce395b", 0x4e, 0xffffffffffffd0ed}], 0x40000, &(0x7f0000000540)=ANY=[@ANYBLOB='quota,errors=remount-ro,noquota,uid=', @ANYRES64=r1, @ANYBLOB=',grpquota,dont_appraise,euid>', @ANYRESDEC=r4, @ANYBLOB="992b9392dd53677ab6082634e55e0b1c810f303c512ee728ad0b48ac6b21989b140045c70e859ca7191ec6343a2d8c0d6939e0c6ee3619b5cd04cf75d979b1310300284e239779cc05ba4af01b35e8a765ab7ad749b032f43e22bcb0ee576fe83de5749471a8163323a7b782955ea67178a2d9fc6bfcb0d3ab0c344c7996e7174586bd20beb02dff2b0483664aa7ae1589246f2340ea86c7455a57b503fcfd1d4b744e00a7626636c274328e0e1e74bd2ce85af12233b256aa6462f5548cbd706131db92e37893a9b25aa8821476aa8c0c9d470df447dc19b411c3575fa1fb996d3518159795e28dc0cd0f7a9400d8e8ec4332c54cd6e897a6e738d3f0c18aa7929c4a00625d3587d1a8063f9c67bdecc389c6edbf02ef57a6bcaee3d905765ef5ad2a8a01f46f7b79a793529cad6836e34530dfcd2a0ce352f8fe95c01436d9fbce1a7097b70cb1844c4b2f3dc15406c6ce21ea2d3bf616698072c85221ca89db2964915b81f2dfcf2c17cdf5baf7bfe3b21b466fba301aff5b24bb0fea0480ddde8c8545f8a271228a2cc78513b30e7e04057779e5ccbc2783"]) r5 = accept4(r2, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000100)) splice(r0, 0x0, r5, 0x0, 0x30007, 0x0) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) fcntl$getownex(r6, 0x10, &(0x7f0000000080)) r7 = socket$inet_udplite(0x2, 0x2, 0x88) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$SIOCX25GSUBSCRIP(r8, 0x89e0, &(0x7f0000000140)={'tunl0\x00', 0x6, 0x2}) splice(r3, &(0x7f0000000080)=0x2, r6, &(0x7f00000000c0)=0xe8, 0x40, 0x4) 19:00:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000080)={0x3, 0x5, 0x2}) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000140)={0x0, 0x5, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "bc4c74c7"}, 0x0, 0x2, @offset=0x400040, 0x10ff00}) [ 1487.914299] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1487.914314] EXT4-fs (loop3): Invalid log block size: 31235 [ 1487.987593] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1488.002473] EXT4-fs (loop3): Invalid log block size: 31235 19:00:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903c00000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 19:00:09 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="895b74e2ed7a32ea79b717bc42c33a565d019abadd5a3d871dbb918bcc1518839ca881", 0x23}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1488.177794] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1488.177813] EXT4-fs (loop3): Invalid log block size: 49155 [ 1488.235610] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1488.235625] EXT4-fs (loop3): Invalid log block size: 49155 19:00:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000300000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) [ 1488.472980] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1488.472996] EXT4-fs (loop3): Invalid log block size: 196611 19:00:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903100400000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) [ 1488.503751] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1488.503768] EXT4-fs (loop3): Invalid log block size: 196611 19:00:10 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=@getqdisc={0x24, 0x26, 0x1}, 0x24}}, 0x0) 19:00:10 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x4b4a, &(0x7f0000000040)={0x3, {0x3}}) [ 1488.652652] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1488.687664] EXT4-fs (loop3): Invalid log block size: 266243 19:00:10 executing program 4: fstat(0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) [ 1488.749857] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1488.760630] EXT4-fs (loop3): Invalid log block size: 266243 19:00:12 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001580)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fef8000000850000000d000000b70000000000000095000000000000002c3f2cc2b7954244cef7499cde2bbaf4b06d3585a09a87507ebf4e43bc06"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002e0, 0x69, 0x20000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0x1, &(0x7f0000000380)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) 19:00:12 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="2275000048000000f3ff000000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0x0) fcntl$setpipe(r1, 0x407, 0x3) syz_genetlink_get_family_id$gtp(&(0x7f0000000000)='gtp\x00') 19:00:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000500000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 19:00:12 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @rand_addr, 0x6}, 0x1c) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_S_EXT_CTRLS(r2, 0xc0205648, &(0x7f0000000080)={0x980000, 0x1000, 0x3, r0, 0x0, &(0x7f0000000000)={0x990a7a, 0x911, [], @ptr=0x3f}}) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcsa\x00', 0xa2000, 0x0) ioctl$VIDIOC_SUBDEV_G_CROP(r3, 0xc038563b, &(0x7f0000000100)={0x1, 0x0, {0x6, 0x6, 0x0, 0x8000}}) 19:00:12 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) bind$inet6(r0, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x3000000, @loopback}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) [ 1490.877787] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1490.907451] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1490.931302] EXT4-fs (loop3): Invalid log block size: 327683 [ 1491.029204] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1491.058516] EXT4-fs (loop3): Invalid log block size: 327683 19:00:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000600000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 19:00:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000080)={0x3, 0x5, 0x2}) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000140)={0x0, 0x5, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "bc4c74c7"}, 0x0, 0x2, @offset=0x400040, 0x10ff00}) [ 1491.199137] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1491.238511] EXT4-fs (loop3): Invalid log block size: 393219 [ 1491.306711] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1491.314881] EXT4-fs (loop3): Invalid log block size: 393219 19:00:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000700000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 19:00:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000080)={0x3, 0x5, 0x2}) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000140)={0x0, 0x5, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "bc4c74c7"}, 0x0, 0x2, @offset=0x400040, 0x10ff00}) 19:00:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000080)={0x3, 0x5, 0x2}) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000140)={0x0, 0x5, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "bc4c74c7"}, 0x0, 0x2, @offset=0x400040, 0x10ff00}) [ 1491.509446] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1491.544968] EXT4-fs (loop3): Invalid log block size: 458755 [ 1491.616792] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1491.649119] EXT4-fs (loop3): Invalid log block size: 458755 19:00:13 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002680)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@rights={{0x10, 0x1, 0x1, [r0]}}], 0x10}], 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r1, &(0x7f0000001e00), 0x3fffffffffffe36, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) 19:00:13 executing program 2: write$eventfd(0xffffffffffffffff, &(0x7f00000001c0)=0xfff, 0x8) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, r4, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8}]}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_SET_REG(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r4, @ANYBLOB="200028bd7000fbdbdf251a010000f3fe823b5161c494bc557ebb48d5439f24a7fcfbde38be0271d68a59363b4bf3dee610ffd4c60cd6416dda0783cb6990856012a0a141e4cf46d5411e07075a9680baadc79e0450a9d7e0c01a2087f8361084e0e0019febd5efcec287bd10633b6cfc559be594e7dac5523c314cffa1b555c15f2599e4a80790b4af756342a014352a837265b290bff03c1408f5460b5c72b770516956475e6d054165249a83fa3313ec9578ccca62d1304bb0cce75a9da98500629b790b4eb0636a6c25d44a56dccd2bc9ce6886"], 0x1c}, 0x1, 0x0, 0x0, 0x85}, 0x20004005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="2275000048000000f3ff000000000000", 0x10) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) mount(&(0x7f0000000040)=@md0='/dev/md0\x00', &(0x7f00000000c0)='./file1\x00', &(0x7f0000000100)='ubifs\x00', 0x0, 0x0) accept4(r2, 0x0, 0x0, 0x0) 19:00:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000080)={0x3, 0x5, 0x2}) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000140)={0x0, 0x5, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "bc4c74c7"}, 0x0, 0x2, @offset=0x400040, 0x10ff00}) 19:00:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000080)={0x3, 0x5, 0x2}) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000140)={0x0, 0x5, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "bc4c74c7"}, 0x0, 0x2, @offset=0x400040, 0x10ff00}) 19:00:13 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, r4, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8}]}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_JOIN_MESH(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, r4, 0x800, 0x70bd28, 0x25dfdbfb, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x8}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}]}, 0x28}, 0x1, 0x0, 0x0, 0x40800}, 0x20008150) 19:00:13 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903000900000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 19:00:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x4b61, &(0x7f0000000040)={0x3, {0x3}}) [ 1492.007869] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem 19:00:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000080)={0x3, 0x5, 0x2}) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000140)={0x0, 0x5, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "bc4c74c7"}, 0x0, 0x2, @offset=0x400040, 0x10ff00}) 19:00:13 executing program 0: ioctl(0xffffffffffffffff, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) bind$inet6(r0, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x281400, @loopback}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) [ 1492.068094] EXT4-fs (loop3): Invalid log block size: 589827 19:00:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x4b61, &(0x7f0000000040)={0x3, {0x3}}) sendmsg$AUDIT_USER(0xffffffffffffffff, 0x0, 0x0) 19:00:13 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x5, 0x0, 0x2, 0x0, 0x41c0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0x0, 0xfff}, 0x8, 0x0, 0x0, 0x0, 0x0, 0x4, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="2275000048000000f3ff000000020000", 0x10) pipe(&(0x7f0000000180)) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6400) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x79, 0x1}, 0x7) io_setup(0x200007c, &(0x7f00000004c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000240)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0}]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) chroot(&(0x7f0000000000)='./file0/../file0\x00') memfd_create(&(0x7f00000001c0)='\xd3\xde\xbc\"\x10\xe2', 0x1) [ 1492.174917] UBIFS error (pid: 28621): cannot open "/dev/md0", error -22 [ 1492.184982] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1492.257545] EXT4-fs (loop3): Invalid log block size: 589827 [ 1492.288807] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:00:13 executing program 1: unshare(0x40000000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = dup(r1) ioctl$DRM_IOCTL_RES_CTX(r2, 0xc0106426, 0x0) 19:00:13 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903041000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 19:00:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x4b61, &(0x7f0000000040)={0x3, {0x3}}) sendmsg$AUDIT_USER(0xffffffffffffffff, 0x0, 0x0) [ 1492.400679] IPVS: ftp: loaded support on port[0] = 21 [ 1492.453880] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1492.473668] EXT4-fs (loop3): Invalid log block size: 1049603 19:00:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x4b61, &(0x7f0000000040)={0x3, {0x3}}) sendmsg$AUDIT_USER(0xffffffffffffffff, 0x0, 0x0) [ 1492.572105] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1492.577065] IPVS: ftp: loaded support on port[0] = 21 [ 1492.581669] EXT4-fs (loop3): Invalid log block size: 1049603 19:00:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903001f00000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 19:00:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x4b61, &(0x7f0000000040)={0x3, {0x3}}) sendmsg$AUDIT_USER(0xffffffffffffffff, 0x0, 0x0) 19:00:14 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x68001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x40, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r1, 0x20, 0x0, 0x40, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8}, 0x20) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) 19:00:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903002000000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) [ 1492.774396] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1492.782476] EXT4-fs (loop3): Invalid log block size: 2031619 19:00:14 executing program 1: unshare(0x40000000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = dup(r1) ioctl$DRM_IOCTL_RES_CTX(r2, 0xc0106426, 0x0) 19:00:14 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) eventfd(0x7) syz_open_procfs(0x0, &(0x7f0000000040)='net/dev\x00') socket$rxrpc(0x21, 0x2, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r1+30000000}, 0x0) 19:00:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x4b61, &(0x7f0000000040)={0x3, {0x3}}) [ 1492.943755] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1492.952054] EXT4-fs (loop3): Invalid log block size: 2097155 [ 1492.955390] IPVS: ftp: loaded support on port[0] = 21 [ 1493.015669] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1493.030322] EXT4-fs (loop3): Invalid log block size: 2097155 19:00:14 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCAX25CTLCON(r1, 0x89e8, &(0x7f0000000080)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x4, 0x6, 0x1, [@null, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="2275000048000000f3ff000000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0x0) 19:00:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903002200000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) 19:00:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x4b61, &(0x7f0000000040)={0x3, {0x3}}) 19:00:14 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f00000000c0)=r2) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7132}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000040)={'lo\x00', 0x400}) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000006c0)=ANY=[@ANYBLOB="2000000011000d0400"/20, @ANYRES32=r5], 0x20}}, 0x0) [ 1493.236824] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1493.283916] EXT4-fs (loop3): Invalid log block size: 2228227 19:00:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCL_SETSEL(0xffffffffffffffff, 0x4b61, &(0x7f0000000040)={0x3, {0x3}}) 19:00:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCL_SETSEL(0xffffffffffffffff, 0x4b61, &(0x7f0000000040)={0x3, {0x3}}) [ 1493.394009] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1493.418317] EXT4-fs (loop3): Invalid log block size: 2228227 19:00:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="25bca274769e620a2734fa0095e0612687ecb86a548802a903002300000000744e2f98b579a782d257146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x3, &(0x7f0000000080)) [ 1493.610238] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1493.633593] ================================================================== [ 1493.641457] BUG: KASAN: use-after-free in free_netdev+0x3a7/0x410 [ 1493.645987] EXT4-fs (loop3): Invalid log block size: 2293763 [ 1493.647980] Read of size 8 at addr ffff888051b069e0 by task syz-executor.1/28796 [ 1493.647989] [ 1493.648006] CPU: 0 PID: 28796 Comm: syz-executor.1 Not tainted 4.19.134-syzkaller #0 [ 1493.648015] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1493.648021] Call Trace: [ 1493.648044] dump_stack+0x1fc/0x2fe [ 1493.648068] print_address_description.cold+0x54/0x219 [ 1493.693468] kasan_report_error.cold+0x8a/0x1c7 [ 1493.698179] ? free_netdev+0x3a7/0x410 [ 1493.702079] __asan_report_load8_noabort+0x88/0x90 [ 1493.707028] ? free_netdev+0x3a7/0x410 [ 1493.711023] free_netdev+0x3a7/0x410 [ 1493.714946] netdev_run_todo+0x89b/0xab0 [ 1493.719144] ? default_device_exit_batch+0x3c0/0x3c0 [ 1493.724333] ? rtnl_newlink+0x15a0/0x15a0 [ 1493.728506] rtnetlink_rcv_msg+0x460/0xb80 [ 1493.732768] ? rtnl_calcit.isra.0+0x430/0x430 [ 1493.737295] ? memcpy+0x35/0x50 [ 1493.740604] ? netdev_pick_tx+0x2f0/0x2f0 [ 1493.744873] ? __copy_skb_header+0x414/0x500 [ 1493.749488] ? kfree_skbmem+0x140/0x140 [ 1493.753564] netlink_rcv_skb+0x160/0x440 [ 1493.757670] ? rtnl_calcit.isra.0+0x430/0x430 [ 1493.762201] ? netlink_ack+0xae0/0xae0 [ 1493.766122] netlink_unicast+0x4d5/0x690 [ 1493.770303] ? netlink_sendskb+0x110/0x110 [ 1493.774648] netlink_sendmsg+0x6bb/0xc40 [ 1493.778825] ? nlmsg_notify+0x1a0/0x1a0 [ 1493.782836] ? kernel_recvmsg+0x220/0x220 [ 1493.787010] ? nlmsg_notify+0x1a0/0x1a0 [ 1493.791001] sock_sendmsg+0xc3/0x120 [ 1493.794753] ___sys_sendmsg+0x7bb/0x8e0 [ 1493.798766] ? __lock_acquire+0x6de/0x3ff0 [ 1493.803031] ? copy_msghdr_from_user+0x440/0x440 [ 1493.807810] ? __fget+0x32f/0x510 [ 1493.811281] ? lock_downgrade+0x720/0x720 [ 1493.815454] ? check_preemption_disabled+0x41/0x280 [ 1493.820517] ? check_preemption_disabled+0x41/0x280 [ 1493.825643] ? __fget+0x356/0x510 [ 1493.829120] ? do_dup2+0x450/0x450 [ 1493.832690] ? __fdget+0x1d0/0x230 [ 1493.836246] __x64_sys_sendmsg+0x132/0x220 [ 1493.840510] ? __sys_sendmsg+0x1b0/0x1b0 [ 1493.844588] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1493.849358] ? trace_hardirqs_off_caller+0x69/0x210 [ 1493.854393] ? do_syscall_64+0x21/0x620 [ 1493.858406] do_syscall_64+0xf9/0x620 [ 1493.862225] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1493.867423] RIP: 0033:0x45c369 [ 1493.870627] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1493.889653] RSP: 002b:00007fbdc261ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1493.897372] RAX: ffffffffffffffda RBX: 000000000002b740 RCX: 000000000045c369 [ 1493.906464] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000005 [ 1493.913753] RBP: 000000000078c080 R08: 0000000000000000 R09: 0000000000000000 [ 1493.921030] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000078c04c [ 1493.928313] R13: 00007fff6cadf4af R14: 00007fbdc261f9c0 R15: 000000000078c04c [ 1493.935606] [ 1493.937240] Allocated by task 28779: [ 1493.940962] __kmalloc+0x15a/0x3c0 [ 1493.944503] sk_prot_alloc+0x1e2/0x2d0 [ 1493.948385] sk_alloc+0x36/0xec0 [ 1493.951863] tun_chr_open+0x7b/0x560 [ 1493.955680] misc_open+0x372/0x4a0 [ 1493.959222] chrdev_open+0x266/0x770 [ 1493.962939] do_dentry_open+0x4aa/0x1160 [ 1493.967004] path_openat+0x793/0x2df0 [ 1493.970805] do_filp_open+0x18c/0x3f0 [ 1493.974610] do_sys_open+0x3b3/0x520 [ 1493.978329] do_syscall_64+0xf9/0x620 [ 1493.982133] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1493.987315] [ 1493.988939] Freed by task 28774: [ 1493.992319] kfree+0xcc/0x210 [ 1493.995431] __sk_destruct+0x5ff/0x810 [ 1493.999347] __sk_free+0x165/0x3b0 [ 1494.002898] sk_free+0x3b/0x50 [ 1494.006104] __tun_detach+0xccb/0x1320 [ 1494.010007] tun_chr_close+0x10e/0x180 [ 1494.013904] __fput+0x2ce/0x890 [ 1494.017190] task_work_run+0x148/0x1c0 [ 1494.021086] exit_to_usermode_loop+0x251/0x2a0 [ 1494.025682] do_syscall_64+0x538/0x620 [ 1494.029587] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1494.034793] [ 1494.036438] The buggy address belongs to the object at ffff888051b06340 [ 1494.036438] which belongs to the cache kmalloc-4096 of size 4096 [ 1494.049301] The buggy address is located 1696 bytes inside of [ 1494.049301] 4096-byte region [ffff888051b06340, ffff888051b07340) [ 1494.061457] The buggy address belongs to the page: [ 1494.066403] page:ffffea000146c180 count:1 mapcount:0 mapping:ffff88812c39cdc0 index:0x0 compound_mapcount: 0 [ 1494.076493] flags: 0xfffe0000008100(slab|head) [ 1494.082598] raw: 00fffe0000008100 ffffea00013b0a08 ffffea00021b1b88 ffff88812c39cdc0 [ 1494.090845] raw: 0000000000000000 ffff888051b06340 0000000100000001 0000000000000000 [ 1494.099354] page dumped because: kasan: bad access detected [ 1494.105090] [ 1494.106705] Memory state around the buggy address: [ 1494.111637] ffff888051b06880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1494.119273] ffff888051b06900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1494.126645] >ffff888051b06980: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1494.134009] ^ [ 1494.140531] ffff888051b06a00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1494.147905] ffff888051b06a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1494.156262] ================================================================== [ 1494.164174] Disabling lock debugging due to kernel taint [ 1494.223812] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1494.239732] EXT4-fs (loop3): Invalid log block size: 2293763 [ 1494.271270] Kernel panic - not syncing: panic_on_warn set ... [ 1494.271270] [ 1494.278687] CPU: 1 PID: 28796 Comm: syz-executor.1 Tainted: G B 4.19.134-syzkaller #0 [ 1494.287976] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1494.297736] Call Trace: [ 1494.300349] dump_stack+0x1fc/0x2fe [ 1494.304003] panic+0x26a/0x50e [ 1494.307213] ? __warn_printk+0xf3/0xf3 [ 1494.311118] ? preempt_schedule_common+0x45/0xc0 [ 1494.315902] ? ___preempt_schedule+0x16/0x18 [ 1494.320348] ? trace_hardirqs_on+0x55/0x210 [ 1494.324688] kasan_end_report+0x43/0x49 [ 1494.328684] kasan_report_error.cold+0xa7/0x1c7 [ 1494.333408] ? free_netdev+0x3a7/0x410 [ 1494.337510] __asan_report_load8_noabort+0x88/0x90 [ 1494.342463] ? free_netdev+0x3a7/0x410 [ 1494.346369] free_netdev+0x3a7/0x410 [ 1494.350109] netdev_run_todo+0x89b/0xab0 [ 1494.354198] ? default_device_exit_batch+0x3c0/0x3c0 [ 1494.359348] ? rtnl_newlink+0x15a0/0x15a0 [ 1494.363514] rtnetlink_rcv_msg+0x460/0xb80 [ 1494.367807] ? rtnl_calcit.isra.0+0x430/0x430 [ 1494.372348] ? memcpy+0x35/0x50 [ 1494.375658] ? netdev_pick_tx+0x2f0/0x2f0 [ 1494.379832] ? __copy_skb_header+0x414/0x500 [ 1494.384263] ? kfree_skbmem+0x140/0x140 [ 1494.388287] netlink_rcv_skb+0x160/0x440 [ 1494.392400] ? rtnl_calcit.isra.0+0x430/0x430 [ 1494.396925] ? netlink_ack+0xae0/0xae0 [ 1494.401469] netlink_unicast+0x4d5/0x690 [ 1494.405620] ? netlink_sendskb+0x110/0x110 [ 1494.409890] netlink_sendmsg+0x6bb/0xc40 [ 1494.414012] ? nlmsg_notify+0x1a0/0x1a0 [ 1494.418271] ? kernel_recvmsg+0x220/0x220 [ 1494.422750] ? nlmsg_notify+0x1a0/0x1a0 [ 1494.426745] sock_sendmsg+0xc3/0x120 [ 1494.430476] ___sys_sendmsg+0x7bb/0x8e0 [ 1494.434467] ? __lock_acquire+0x6de/0x3ff0 [ 1494.438721] ? copy_msghdr_from_user+0x440/0x440 [ 1494.443704] ? __fget+0x32f/0x510 [ 1494.447280] ? lock_downgrade+0x720/0x720 [ 1494.451490] ? check_preemption_disabled+0x41/0x280 [ 1494.456565] ? check_preemption_disabled+0x41/0x280 [ 1494.461629] ? __fget+0x356/0x510 [ 1494.465284] ? do_dup2+0x450/0x450 [ 1494.468936] ? __fdget+0x1d0/0x230 [ 1494.472512] __x64_sys_sendmsg+0x132/0x220 [ 1494.478426] ? __sys_sendmsg+0x1b0/0x1b0 [ 1494.483648] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1494.488440] ? trace_hardirqs_off_caller+0x69/0x210 [ 1494.493747] ? do_syscall_64+0x21/0x620 [ 1494.497780] do_syscall_64+0xf9/0x620 [ 1494.501617] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1494.507879] RIP: 0033:0x45c369 [ 1494.511082] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1494.530685] RSP: 002b:00007fbdc261ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1494.538783] RAX: ffffffffffffffda RBX: 000000000002b740 RCX: 000000000045c369 [ 1494.546708] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000005 [ 1494.553984] RBP: 000000000078c080 R08: 0000000000000000 R09: 0000000000000000 [ 1494.561461] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000078c04c [ 1494.568796] R13: 00007fff6cadf4af R14: 00007fbdc261f9c0 R15: 000000000078c04c [ 1494.577715] Kernel Offset: disabled [ 1494.583807] Rebooting in 86400 seconds..