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", 0xfe0}], 0x6, &(0x7f0000001c40)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x3}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r11, @multicast2, @broadcast}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x9a}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @loopback}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r11, @multicast2, @loopback}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xff}}], 0xc0}}, {{0x0, 0x0, &(0x7f0000001f00)}}, {{&(0x7f0000001fc0)={0x2, 0x4e22, @local}, 0x10, &(0x7f0000002200)=[{&(0x7f0000002000)="0164bb1b3cee91d2d23fd07164e71a7801f5084d8bbddc585359319c5af5ff173d56777cbbacaf7a2230a3decfd93551c04a6802ecc89b510747e5a0a2386a08d8adcb6d093332537d945054cbe7622106975a139d6ea1d907c98abd45fd30b082028e3bbd7f4297240740d6e94e6b58f7c9702fed673cfc90a7d126ffefbb22168cda7311efeef208809a6d6f621c0fa2067af03ce38f8205e9988f461be9c70b7d59ff93ff09decf74a9e55430468f15e22cd1fd56879a2f20ab8f1fd80135e9ac1e61f7e87fd6", 0xc8}, {&(0x7f0000002100)="9ded0933fadacbada31ad7b75482074167847b16d8ccdde9b9012cb97c10a85ff942c8f98c1d075f7d5a3367a81d5afc07e162b62f982ed1e7a362fe41e53bcd5d8ddbe0886a755300da5f4ce107c1948f829061f5e99af66c0500003f3296206702616904a1dcba056f1854deba8c64262e5ced27d343", 0x77}, {&(0x7f0000002180)}], 0x3, &(0x7f0000000380)=ANY=[]}}, {{&(0x7f0000002280)={0x2, 0x4e24, @broadcast}, 0x10, &(0x7f0000002400)=[{&(0x7f00000022c0)="247badb355c651b14744280a13c3b8ffcb44beacbfe5f126189e667bcf69a0bc7cb25e2358332fb486915eec8cce7775876b447a45deb35e5b3f8c346e1b008cd8f583159970ca105cd1389d417e87c3383a2b893230e3635eb35502a705832a2d60d7a39dbac94ecca5ffd0da556dcef4ba376eb09519ad2820a60ff79f8a661d", 0x81}, {&(0x7f0000002380)="981176b1f9d40ffae09bf001311558ee3ee0", 0x12}, {&(0x7f0000002540)="7668884946f4985f31ce5a0698abbf12f91e08000000000000feb13b1ca910cb1b9902000000000000006752b125822dd71199ead39298707e7599088f7425077a19ab5b596178f9ab7a27d9cff7fee568927ca35f2a66eb1bd0bb885cc09569eaa8ba7eeeda3603aa8fdebe00d67ff3f2cc5782afbc805626299f0b42eb47f48f0e94404a", 0x85}], 0x3}}], 0x4, 0x140060c4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002f00)={'\x00', r11}) getpeername$packet(0xffffffffffffffff, &(0x7f0000002f40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002f80)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f000000a740)=[{{&(0x7f0000003140)=@tipc, 0x80, &(0x7f0000003680)=[{&(0x7f00000031c0)=""/111, 0x6f}, {&(0x7f0000003240)=""/72, 0x48}, {&(0x7f00000032c0)=""/166, 0xa6}, {&(0x7f0000003380)=""/76, 0x4c}, {&(0x7f0000003400)=""/14, 0xe}, {&(0x7f0000003440)=""/184, 0xb8}, {&(0x7f0000003500)=""/51, 0x33}, {&(0x7f0000003540)=""/216, 0xd8}, {&(0x7f0000003640)=""/53, 0x35}], 0x9, &(0x7f0000003740)=""/4096, 0x1000}, 0x89}, {{&(0x7f0000004740)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f00000049c0)=[{&(0x7f00000047c0)=""/169, 0xa9}, {&(0x7f0000004880)=""/57, 0x39}, {&(0x7f00000048c0)=""/36, 0x24}, {&(0x7f0000004900)=""/141, 0x8d}], 0x4, &(0x7f0000004a00)=""/162, 0xa2}, 0x101}, {{&(0x7f0000004ac0)=@ax25={{0x3, @netrom}, [@netrom, @null, @null, @rose, @netrom, @netrom, @null, @rose]}, 0x80, &(0x7f0000006c80)=[{&(0x7f0000004b40)=""/4096, 0x1000}, {&(0x7f0000005b40)=""/248, 0xf8}, {&(0x7f0000005c40)=""/4096, 0x1000}, {&(0x7f0000006c40)=""/38, 0x26}], 0x4, &(0x7f0000006cc0)=""/222, 0xde}, 0x7f}, {{0x0, 0x0, &(0x7f0000006ec0)=[{&(0x7f0000006dc0)=""/85, 0x1}, {&(0x7f0000006e40)=""/69, 0x45}], 0x2, &(0x7f0000006f00)=""/241, 0xf1}, 0x80}, {{&(0x7f0000007000)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007180)=[{&(0x7f0000007080)=""/117, 0x75}, {&(0x7f0000007100)=""/88, 0xffffffffffffff2d}], 0x2, &(0x7f00000071c0)=""/5, 0x5}, 0x5}, {{&(0x7f0000007200)=@ax25={{0x3, @default}, [@default, @remote, @bcast, @default, @null, @default, @bcast, @bcast]}, 0x80, &(0x7f000000a480)=[{&(0x7f0000007280)=""/4096, 0x1310}, {&(0x7f0000008280)=""/67, 0x43}, {&(0x7f0000008300)=""/4096, 0x1000}, {&(0x7f0000009300)=""/184, 0x5}, {&(0x7f00000093c0)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/176, 0xb0}], 0x6}, 0x5}, {{&(0x7f000000a500)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f000000a680), 0x1, &(0x7f000000a6c0)=""/82, 0x52}, 0x53}], 0x7, 0x4081, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r16 = dup(r15) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) accept4$packet(r16, &(0x7f000000a900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000a940)=0x14, 0x41800) getpeername$packet(0xffffffffffffffff, &(0x7f000000a980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a9c0)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000340)={@remote, @rand_addr, 0x0}, &(0x7f0000000700)=0xc) sendmmsg$inet(r19, &(0x7f0000002440)=[{{&(0x7f0000000100)={0x2, 0x4e22, @loopback}, 0x10, &(0x7f0000001a40)=[{&(0x7f0000000440)="f4f337b6b6db8f5b98c3fee0969fce56fd9fe6c807b9e84156aa0562d8b325515293e9e29887eb7aa9889f47c5a936bbee29c5629c0b79f3eb1ec092471e83144e4a3288abe73140dfbe3eff8f2e", 0x4e}, {0x0}, {&(0x7f0000000780)="9862618128fae4ddc89ba66b93884b5cb1a5761651b338e0312b637bf57a74006ef64033755b841e168f18fb671e456103bf6603968479d941cf032450233af235a7c7587ee3b87c1ba259cea65adebd4e1b8590364bc6ce82f1af11d195118676e5ff8a0feb09f67ea83266c488d1493be0833a23aa6c50ae4263727b04175b438d4134e97113b38570619ce19445cb8782f515357699311a2009972791f2899b05e08ba6007cc2996eb63964e70dce4c72dfa5f38a7fa9a7b571e1d277db922ebe713c86181ee61e32257eb81fb4a07dd6389e185ac85d7303f5141016d0d5a0e10a6bb88bced2d38d1d60aee1d4fbcc2d37645933", 0xf6}, {&(0x7f0000000880)="208edd5c9d4e6dc2213ef5b5321a39768a91b0987f42285231256062bf9ab234c53b8c349a41349e08507c7929665d3283be4d5e8e01607a177ee07b3a04bbd905b8dd5e0329be54efdd2795dea3fded901a36adfc0b6c32156605580d114c73527b372332e4fef20c79a261fadbc600a36acf95ed8a4b3c393d235f18bcafc15f8be762a4c7f522c0cae959f7d0558512c2", 0x92}, {&(0x7f0000000340)}, {&(0x7f0000000a40)="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", 0xfe0}], 0x6, &(0x7f0000001c40)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x3}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r20, @multicast2, @broadcast}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x9a}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @loopback}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r20, @multicast2, @loopback}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xff}}], 0xc0}}, {{0x0, 0x0, &(0x7f0000001f00)}}, {{&(0x7f0000001fc0)={0x2, 0x4e22, @local}, 0x10, &(0x7f0000002200)=[{&(0x7f0000000580)="0164bb1b3cee91d2d23fd07164e71a7801f5084d8bbddc585359319c5af5ff173d56777cbbacaf7a2230a3decfd93551c04a6802ecc89b510747e5a0a2386a08d8adcb6d093332537d945054cbe7622106975a6d9d6ea1d907c98abd45fd30b082028e3bbd7f4297240740d6e94e6b58f7c9702fed673cfc90a70100ffefbb22168cda7311efeef2086f621c0fa2067af03ce38f8205e9988f461be9c70b7d59ff93ff09decf74a9e55430468f15e22cd1fd56879a2f20ab8f1fd80135e9ac1e61eee57fd6000000b45aad47", 0xcc}, {&(0x7f0000002100)="9ded0933fadacbada31ad7b75482074167847b16d8ccdde9b9012cb97c10a85ff942c8f98c1d075f7d5a3367a81d5afc07e162b62f982ed1e7a362fe41e53bcd5d8ddbe0886a755300da5f4ce107c1948f829061f5e99af66c0500003f3296206702616904a1dcba056f1854deba8c64262e5ced27d343", 0x77}, {&(0x7f0000002180)}], 0x3, &(0x7f0000000380)=ANY=[]}}, {{&(0x7f0000002280)={0x2, 0x4e24, @broadcast}, 0x10, &(0x7f0000002400)=[{&(0x7f00000022c0)="247badb355c651b14744280a13c3b8ffcb44beacbfe5f126189e667bcf69a0bc7cb25e2358332fb486915eec8cce7775876b447a45deb35e5b3f8c346e1b008cd8f583159970ca105cd1389d417e87c3383a2b893230e3635eb35502a705832a2d60d7a39dbac94ecca5ffd0da556dcef4ba376eb09519ad2820a60ff79f8a661d", 0x81}, {&(0x7f0000002380)="981176b1f9d40ffae09bf001311558ee3ee0", 0x12}, {&(0x7f0000002540)="7668884946f4985f31ce5a0698abbf12f91e08000000000000feb13b1ca910cb1b9902000000000000006752b125822dd71199ead39298707e7599088f7425077a19ab5b596178f9ab7a27d9cff7fee568927ca35f2a66eb1bd0bb885cc09569eaa8ba7eeeda3603aa8fdebe00d67ff3f2cc5782afbc805626299f0b42eb47f48f0e94404a", 0x85}], 0x3}}], 0x4, 0x140060c4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000aa00)={'veth1_to_bond\x00', r20}) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f000000ae40)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8008821}, 0xc, &(0x7f000000ae00)={&(0x7f000000aa40)={0x398, r6, 0x300, 0x70bd29, 0x25dfdbfb, {}, [{{0x8, 0x1, r7}, {0x40, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}]}}, {{0x8, 0x1, r9}, {0x130, 0x2, [{0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r13}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r14}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r17}, {0x180, 0x2, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0xb2ea}}, {0x8, 0x6, r18}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0xca9}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x8001}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}]}}, {{0x8, 0x1, r21}, {0x74, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x1ff}}}]}}]}, 0x398}, 0x1, 0x0, 0x0, 0x20000800}, 0x0) r22 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r22, 0x8912, 0x400200) write$binfmt_misc(r22, &(0x7f0000000000)={'syz0', "4ac65b2676c906265068c0c2f011fe9765efe54616cfc2558b3a7a604e5df1872e1d9f4a2f873130836404d3081d9a08c9b68c478ef0aa8614368e44eef28ec2a888864c69576656403028841c4576e72d5dc28fe7c8d93e957c6a64e6a23475f305a6"}, 0x67) clone(0x20008579, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 19:16:11 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', 0x0, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:11 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) madvise(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x12) sysinfo(&(0x7f0000000000)=""/199) 19:16:11 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000000)={'ip6gre0\x00', 0x4}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b45602117fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@expire={0xf8, 0x18, 0xeaba11b19d61edd9, 0x0, 0x0, {{{@in=@empty, @in=@broadcast, 0x0, 0x0, 0x4e24}, {@in=@multicast1}, @in=@dev, {0x100}, {}, {}, 0x70bd25, 0x0, 0x2}}}, 0xf8}, 0x8}, 0x0) [ 821.826339] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 19:16:12 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', 0x0, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 821.893841] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 19:16:12 executing program 3: timer_create(0x6, 0x0, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f00000001c0)) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000080)) mmap$perf(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0xa, 0x121010, r1, 0x10000) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="5500000018007f4500fe01b2a4a280930a06000000a84599910000002900090008002600010000001900150006000000000067c01338d54400009ba1136ef75a9251b77226483113e92f13e70b9cfb83de44b2ee3b", 0x55}], 0x1}, 0x0) 19:16:12 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:12 executing program 0: r0 = socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockname(r0, &(0x7f00000001c0)=@rc, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) rmdir(&(0x7f0000000240)='./file0\x00') unlinkat(r2, &(0x7f0000000140)='./file0\x00', 0x300) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x100000000000a, 0x0) ioctl$sock_TIOCINQ(r3, 0x541b, &(0x7f0000000100)) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x1d8) dup2(r4, r2) ioctl$TCSETSF(r3, 0x5404, &(0x7f0000000380)={0x4, 0x0, 0x0, 0x899, 0xd, 0x0, 0x1c, 0x1f, 0x0, 0x18c, 0x1, 0x200}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$FS_IOC_SETVERSION(r6, 0x40087602, &(0x7f00000002c0)=0xffffffffffff7fff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r7, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:12 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x0, 0x0) dup2(r0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10116, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x5e545cad, 0x0, 0x0, 0xfff, 0x9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x100000001) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) chroot(&(0x7f0000000080)='./file0\x00') creat(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000480)={0x1, 0x3, 0x2, 0x0, 0x8, [{0x780c, 0x1, 0xdce, 0x0, 0x0, 0xc6491a9104ba39a5}, {0x8, 0x400, 0x3e, 0x0, 0x0, 0x1000}, {0x0, 0x40, 0x1, 0x0, 0x0, 0x280}, {0x9, 0x4, 0x6, 0x0, 0x0, 0x2801}, {0xb8f9, 0x4, 0x5, 0x0, 0x0, 0x1}, {0x1, 0x7fff, 0xa5, 0x0, 0x0, 0x5}, {0x6, 0xffffffffffff4b40, 0x3, 0x0, 0x0, 0x240}, {0x9ae5, 0xa209, 0xa5, 0x0, 0x0, 0x200}]}) umount2(0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$sock_timeval(r2, 0x1, 0x15, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r3, 0x29, 0x15, &(0x7f0000000080)={@dev}, 0x14) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000100)=@v1={0x0, @aes128, 0x4, "af87e887256c66d1"}) tee(r2, r1, 0x9, 0xb) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x43, &(0x7f0000000300), &(0x7f0000000340)=0x10) listxattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000d40)=""/4096, 0x1000) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xeea2484e71e15b58, 0x20) 19:16:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000240)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd02000000b579a7186270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="6a6f75726e616c5f696f7072696fef0b00003030303030303030303030303030302c00"]) [ 822.115791] EXT4-fs (loop3): Unrecognized mount option "journal_ioprioļ " or missing value 19:16:12 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = timerfd_create(0x0, 0x0) fstat(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = timerfd_create(0x0, 0x0) fstat(r4, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(r5, 0x0, 0x0) r6 = timerfd_create(0x0, 0x0) fstat(r6, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(r7, 0x0, 0x0) setresgid(r3, r7, r5) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x10000) dup(r8) ioctl$FS_IOC_ENABLE_VERITY(r8, 0x40806685, &(0x7f00000002c0)={0x1, 0x0, 0x1000, 0x6e, &(0x7f0000000200)="d80720d5cf2cbbb268ffa4cfc406cb16525daecf5ded0a9e2a40a3b3e8e0034dc41b487242401a67cc46eb9ddd6675da78dc70ed828c290dcb2ae0094847c5d2c6367a31ca37d449990840744ca79b6db3ee6bf62a3cf014f678188a5b88743f6ab73dec14ed9c08478279d70440", 0x3, 0x0, &(0x7f0000000280)="4af2b1"}) r9 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) mmap$perf(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2000008, 0x11, r9, 0x1) setfsgid(r3) madvise(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x12) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000080)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:admin_passwd_exec_t:s0\x00', 0x29, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup(r10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) setsockopt$packet_fanout_data(r11, 0x107, 0x16, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0xd168, 0x0, 0x1, 0x5}, {0x3, 0x20, 0x8, 0x5}, {0x8, 0x40, 0xfb}, {0x3, 0x3, 0x5, 0x8}, {0x2, 0x1, 0x0, 0x3}, {0x9, 0x9, 0x1, 0x400}, {0x3, 0x0, 0x9, 0x24c}]}, 0x10) ioctl$int_out(r2, 0x5460, &(0x7f00000001c0)) ioctl$SNDRV_TIMER_IOCTL_TREAD(r11, 0x40045402, &(0x7f0000000100)=0x1) [ 822.212271] EXT4-fs (loop3): Unrecognized mount option "journal_ioprioļ " or missing value 19:16:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x613a474ef4977634, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r3 = socket(0xd, 0x1, 0x7) setsockopt$inet_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x3b) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r4, 0x0, 0x0) r5 = syz_open_procfs(r4, &(0x7f0000000080)='net/udplite\x00') sendto$inet6(r5, &(0x7f00000000c0)="835260cd6ac4e5afab270680174104849b66f05309630d401ac3816b494089fa3b95fe8bb33ff815d57ee4dd2f4a355cdebedcec1a25488fc91a47704bb1ef7b8411da79f9e79610eec5ca7e204708b624c5ab3fe2436270928db322d5eeeba7395e6070b43a4323497720215ca24d18", 0x70, 0x200000c0, &(0x7f0000000140)={0xa, 0x4e22, 0x5, @empty, 0xf0bb}, 0x1c) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) listen(r6, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000480)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) tkill(0xffffffffffffffff, 0x20) 19:16:12 executing program 5: openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PPPIOCGDEBUG(r1, 0x80047441, &(0x7f0000000000)) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6#\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x703}) 19:16:12 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_SET_THP_DISABLE(0x29, 0x0) dup(r0) madvise(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x12) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f0000000000)={0x0, 0x29, "7445df7d5d3e45d4d00f95c10dbbb8406ab2911690accde8b1ec16461adafd6ff38643d49f79ec3e8d"}) 19:16:12 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:12 executing program 3: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) vmsplice(r0, &(0x7f0000001580)=[{&(0x7f00000001c0)="7e8279798321a3547fe14db7a3f0a7bb8b00da41c614e69e1c04211b4f", 0x1d}], 0x1, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 19:16:12 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', 0x0, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:12 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$unix(r3, &(0x7f0000000080)=@abs={0x1, 0x0, 0x4e24}, 0x6e) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) fadvise64(r5, 0x9, 0x1, 0x0) madvise(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x12) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) utimensat(r7, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={{}, {0x0, 0x7530}}, 0x423b3bec768819e) 19:16:12 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000080)="24000000200007041dfffd946f61050081", 0x11}], 0x1}, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000cc0)={0x0, 0x0, 0x0}, 0x0) socket$inet6(0xa, 0x89e075c6183512e7, 0x85) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) r2 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) open(&(0x7f0000000100)='./bus\x00', 0x3100, 0x1c4) fallocate(r3, 0x0, 0x0, 0x1000f4) readv(0xffffffffffffffff, &(0x7f0000001380)=[{0x0}], 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) fallocate(r4, 0x16, 0xfffffffffffffffc, 0x739d) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000041c0)=ANY=[@ANYBLOB='n'], 0x1) signalfd(r2, &(0x7f00000000c0)={0x5}, 0x8) ftruncate(r2, 0x8200) readv(0xffffffffffffffff, &(0x7f0000002340)=[{0x0}], 0x1) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000300)={'broute\x00'}, &(0x7f0000000140)=0x78) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d900f) socket$inet6(0xa, 0x2, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000004b00)=[{{0x0, 0x0, &(0x7f0000001c00)=[{0x0}, {&(0x7f0000001b80)}], 0x2, &(0x7f0000004bc0)=ANY=[]}}], 0x1, 0x4021000) 19:16:13 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) socket(0x10, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r8 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r9 = dup2(0xffffffffffffffff, r8) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r10 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r9, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(r1, r10, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:13 executing program 0: r0 = socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockname(r0, &(0x7f00000001c0)=@rc, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) rmdir(&(0x7f0000000240)='./file0\x00') unlinkat(r2, &(0x7f0000000140)='./file0\x00', 0x300) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x100000000000a, 0x0) ioctl$sock_TIOCINQ(r3, 0x541b, &(0x7f0000000100)) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x1d8) dup2(r4, r2) ioctl$TCSETSF(r3, 0x5404, &(0x7f0000000380)={0x4, 0x0, 0x0, 0x899, 0xd, 0x0, 0x1c, 0x1f, 0x0, 0x18c, 0x1, 0x200}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$FS_IOC_SETVERSION(r6, 0x40087602, &(0x7f00000002c0)=0xffffffffffff7fff) r7 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r7, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:13 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) pidfd_send_signal(r5, 0x24, &(0x7f0000000100)={0x2c, 0x3, 0x8}, 0x0) r6 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r6, 0x4, 0x6100) ftruncate(r6, 0x8200) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r6, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4200400}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x28, r7, 0x1, 0x70bd2b, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0xc, 0x13, @l2={'ib', 0x3a, 'sit0\x00'}}}, ["", "", "", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24000010}, 0x20000890) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) sendmsg$TIPC_CMD_SET_LINK_PRI(r9, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000200)={0x68, r7, 0x300, 0xfff, 0x25dfdbfd, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x10001, @media='ib\x00'}}}, ["", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x40042}, 0x40e5) madvise(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x12) 19:16:13 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000080)="24000000200007041dfffd946f61050081", 0x11}], 0x1}, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000cc0)={0x0, 0x0, 0x0}, 0x0) socket$inet6(0xa, 0x89e075c6183512e7, 0x85) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) r2 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) open(&(0x7f0000000100)='./bus\x00', 0x3100, 0x1c4) fallocate(r3, 0x0, 0x0, 0x1000f4) readv(0xffffffffffffffff, &(0x7f0000001380)=[{0x0}], 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) fallocate(r4, 0x16, 0xfffffffffffffffc, 0x739d) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000041c0)=ANY=[@ANYBLOB='n'], 0x1) signalfd(r2, &(0x7f00000000c0)={0x5}, 0x8) ftruncate(r2, 0x8200) readv(0xffffffffffffffff, &(0x7f0000002340)=[{0x0}], 0x1) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000300)={'broute\x00'}, &(0x7f0000000140)=0x78) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d900f) socket$inet6(0xa, 0x2, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000004b00)=[{{0x0, 0x0, &(0x7f0000001c00)=[{0x0}, {&(0x7f0000001b80)}], 0x2, &(0x7f0000004bc0)=ANY=[]}}], 0x1, 0x4021000) 19:16:13 executing program 5: sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000380)={0x14}, 0x14}}, 0x0) sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0xbe199e0d447a8e42, &(0x7f00000002c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="fe99f56245000000130000c61f7281c46fff5e00", @ANYRES16=0x0, @ANYBLOB="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"], 0x1c4}}, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201fdffffff01000000ff07000000000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getpeername$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000340)=0x14) 19:16:13 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/137, 0x89) madvise(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x12) 19:16:13 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) madvise(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x12) mlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) 19:16:13 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f00000000c0)={0x3, 0xfd0, 0x2, 0xf7, 0x6}, 0x14) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000000)={0xa0, 0x29, 0x1, {0x8, [{{0x14, 0x1, 0x2}, 0x6, 0x65, 0x7, './file0'}, {{0x2, 0x0, 0x7}, 0x100, 0x6, 0x1, '.'}, {{0x1, 0x4, 0x8}, 0x8, 0x7, 0x7, './file0'}, {{0x6, 0x2, 0x7}, 0x8000, 0x2, 0x7, './file0'}, {{0x4, 0x2, 0x3}, 0x10001, 0x3, 0x7, './file0'}]}}, 0xa0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) madvise(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x12) 19:16:13 executing program 3: r0 = socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockname(r0, &(0x7f00000001c0)=@rc, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) rmdir(&(0x7f0000000240)='./file0\x00') unlinkat(r2, &(0x7f0000000140)='./file0\x00', 0x300) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x100000000000a, 0x0) ioctl$sock_TIOCINQ(r3, 0x541b, &(0x7f0000000100)) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x1d8) dup2(r4, r2) ioctl$TCSETSF(r3, 0x5404, &(0x7f0000000380)={0x4, 0x0, 0x0, 0x899, 0xd, 0x0, 0x1c, 0x1f, 0x0, 0x18c, 0x1, 0x200}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$FS_IOC_SETVERSION(r6, 0x40087602, &(0x7f00000002c0)=0xffffffffffff7fff) r7 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r7, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:13 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) socket(0x10, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r8 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r9 = dup2(0xffffffffffffffff, r8) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r10 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r9, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(r1, r10, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:13 executing program 0: r0 = socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockname(r0, &(0x7f00000001c0)=@rc, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) rmdir(&(0x7f0000000240)='./file0\x00') unlinkat(r2, &(0x7f0000000140)='./file0\x00', 0x300) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x100000000000a, 0x0) ioctl$sock_TIOCINQ(r3, 0x541b, &(0x7f0000000100)) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x1d8) dup2(r4, r2) ioctl$TCSETSF(r3, 0x5404, &(0x7f0000000380)={0x4, 0x0, 0x0, 0x899, 0xd, 0x0, 0x1c, 0x1f, 0x0, 0x18c, 0x1, 0x200}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r7, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:13 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3}, 0x0) clone(0x800007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000340)=ANY=[@ANYBLOB="13f80f34"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="0cda366f0001aeac44b8055fadbfac2a7dfe5d4965c1dcbe2544be6077bf0925f49126b4bd2dcbf0c45ceeccb6068e2a28b23afa648d27799c7d872b56070000000000000036bc9e892451c93db0ed05311b9e56d77397f8640ce747628488498f2c8c6624e7329e5b17f60fe94e963686a647bbcddc1417ad4f79a4d2a5e964644e4f7edcd054a09445138614285d", @ANYRES64], 0x0, 0x97}, 0x20) tkill(r0, 0x3b) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = accept4$packet(r4, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000005c0)=0x14, 0x80800) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r5) r6 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r6, 0x4, 0x6100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r8, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)=@ipv4_newroute={0x34, 0x18, 0x800, 0x70bd28, 0x25dfdbfd, {0x2, 0x0, 0x10, 0x1, 0xfc, 0x0, 0x0, 0x8, 0x80}, [@RTA_GATEWAY={0x8, 0x5, @remote}, @RTA_MARK={0x8}, @RTA_METRICS={0x8, 0x8, "7a8bb81e"}]}, 0x34}, 0x1, 0x0, 0x0, 0x9c47e545d91aec05}, 0x200c000) ftruncate(r6, 0x8200) r9 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r6, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4200400}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x28, r9, 0x1, 0x70bd2b, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0xc, 0x13, @l2={'ib', 0x3a, 'sit0\x00'}}}, ["", "", "", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24000010}, 0x20000890) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup(r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r11, 0x6, 0x16, &(0x7f0000000380)=[@window={0x3, 0x2}, @window={0x3, 0x3}, @sack_perm, @timestamp], 0x4) sendmsg$TIPC_CMD_SET_NETID(r2, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000200)={&(0x7f0000000040)={0x24, r9, 0x30, 0x70bd25, 0x25dfdbfc, {{}, 0x0, 0x800b, 0x0, {0x8}}, ["", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x20008000}, 0x4040000) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 19:16:13 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, 0x0) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r4, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r4, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r5 = socket(0x9, 0xfffffffffffffffd, 0x8) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r7 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r8 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r9 = dup2(0xffffffffffffffff, r8) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r10 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r9, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r5, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r10, 0x80003) sendfile(r1, r10, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:13 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={'ipddp0\x00', {0x2, 0x4e24, @empty}}) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) madvise(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x12) 19:16:13 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) madvise(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x12) 19:16:13 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = dup(r1) ioctl$sock_inet_SIOCGIFBRDADDR(r2, 0x8919, &(0x7f0000000000)={'batadv0\x00', {0x2, 0x4e24, @remote}}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) madvise(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x12) 19:16:13 executing program 4: ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x3ff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@initdev, @in6=@loopback}}, {{@in6=@local}, 0x0, @in=@dev}}, &(0x7f0000000440)=0xe8) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(0xffffffffffffffff, 0x0, r2) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$EVIOCSABS3F(r3, 0x401845ff, &(0x7f0000000400)={0x69d9, 0x4, 0x800, 0x36c0, 0x8, 0x1}) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') preadv(r4, &(0x7f00000017c0), 0x333, 0x0) accept4(r4, 0x0, &(0x7f0000000040), 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r6, 0x0, r5) mount$bpf(0x0, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRESOCT]) poll(0x0, 0x0, 0xffffffff) r7 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext, 0x0, 0x0, 0x3, 0x0, 0x10001}, 0x0, 0xdfffffffffffffff, r7, 0x2) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(r8, 0x40086607, &(0x7f0000000680)=0x7) r9 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r9, 0x0, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getpeername$unix(r6, &(0x7f0000000100), &(0x7f0000000080)=0x6e) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 19:16:13 executing program 0: r0 = socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockname(r0, &(0x7f00000001c0)=@rc, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) rmdir(&(0x7f0000000240)='./file0\x00') unlinkat(r2, &(0x7f0000000140)='./file0\x00', 0x300) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x100000000000a, 0x0) ioctl$sock_TIOCINQ(r3, 0x541b, &(0x7f0000000100)) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x1d8) dup2(r4, r2) ioctl$TCSETSF(r3, 0x5404, &(0x7f0000000380)={0x4, 0x0, 0x0, 0x899, 0xd, 0x0, 0x1c, 0x1f, 0x0, 0x18c, 0x1, 0x200}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) r6 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r6, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:14 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) socket(0x10, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r8 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r9 = dup2(0xffffffffffffffff, r8) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r10 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r9, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(r1, r10, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:14 executing program 3: r0 = socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockname(r0, &(0x7f00000001c0)=@rc, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) rmdir(&(0x7f0000000240)='./file0\x00') unlinkat(r2, &(0x7f0000000140)='./file0\x00', 0x300) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x100000000000a, 0x0) ioctl$sock_TIOCINQ(r3, 0x541b, &(0x7f0000000100)) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x1d8) dup2(r4, r2) ioctl$TCSETSF(r3, 0x5404, &(0x7f0000000380)={0x4, 0x0, 0x0, 0x899, 0xd, 0x0, 0x1c, 0x1f, 0x0, 0x18c, 0x1, 0x200}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$FS_IOC_SETVERSION(r6, 0x40087602, &(0x7f00000002c0)=0xffffffffffff7fff) r7 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r7, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:14 executing program 4: timer_create(0x7, &(0x7f0000000000)={0x0, 0x22, 0x6, @thr={&(0x7f00000002c0)="fca9af55bf7dfa1f1461aecd9bf9ebc07ba8da7a9b02b5fb7686f00e6195a02c9e9993dc632ba06254e0bb6303347e726fa1b06a28c6b4931f82189e22e258f351a49b3156e5519efd98750ea3a6e04a0e7754c62e97c163f0f12dc2dd799cd10b8f1a371d67a6162119a2eb5bdd7e83d514cac2b1276a7e110e4efba9eb98810fba0e99111c3f6efb2fa44ebf495d0588077c7dac1aa72e2e002bf6d7d7fed4fa916bbb6c3204b840ad048143ac88b66162c0b37815e2d1781d151ba1a55beb", &(0x7f0000000580)}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240), &(0x7f00000003c0)) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x175004, 0x4) syz_open_dev$sndtimer(&(0x7f0000000280)='/dev/snd/timer\x00', 0x0, 0x101000) prctl$PR_SET_TSC(0x1a, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = epoll_create(0xfff) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r1, &(0x7f0000000040)) dup2(r1, r2) ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000100)={0x4a, 0x0, 0x1f}) ioctl$TIOCGDEV(0xffffffffffffffff, 0x80045432, &(0x7f0000000140)) r4 = perf_event_open(0x0, 0x0, 0x0, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x75, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x200000000000001b, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = inotify_init() inotify_add_watch(r5, &(0x7f0000000080)='.\x00', 0xfe) r6 = socket$inet(0x2, 0x2, 0x0) fstat(r4, &(0x7f0000000180)) setsockopt$inet_mreqn(r6, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0x25) dup2(0xffffffffffffffff, r6) socket$inet_tcp(0x2, 0x1, 0x0) r7 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r7, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x74) sendfile(r7, r7, &(0x7f0000000200), 0xa198) syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/net\x00') 19:16:14 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, 0x0) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r4, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r4, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r5 = socket(0x9, 0xfffffffffffffffd, 0x8) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r7 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r8 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r9 = dup2(0xffffffffffffffff, r8) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r10 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r9, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r5, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r10, 0x80003) sendfile(r1, r10, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:14 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r8 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r9 = dup2(0xffffffffffffffff, r8) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r10 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r9, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(r1, r10, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:16 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) signalfd(r2, &(0x7f0000000000)={0xd54c}, 0x8) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3b) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) pidfd_open(r3, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=ANY=[@ANYBLOB="4000080010003b0e000000000000000000000000542476", @ANYRES32=0x0, @ANYBLOB="000000000000000008000400", @ANYRES32=r4, @ANYBLOB="1800120008000100736974000c00020008000200cd2ea155f35519aa08843fb4269152635d1b1ea6573607591be9c2ec37c8a681045e9a21dcf50de8668f788f7642732256c555bdb0d665bc8dd784472724ab9bfece18d8daf89c8e42507c2c295a254d733c056b9540c3f070527603861c01ee51b5feb8045a6291a5cc4ba8a24622abbcc9", @ANYRES32=r4], 0x6}}, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCDARP(r5, 0x8953, &(0x7f0000000240)={{0x2, 0x4e22, @remote}, {0x1, @local}, 0x2, {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}, 'bpq0\x00'}) 19:16:16 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)=0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x70, 0x3, 0x5, 0x3, 0x1f, 0x0, 0xc5a, 0x0, 0xc, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_config_ext={0x20, 0x9a9}, 0x400, 0xfffffffffffffffc, 0x81, 0xa, 0x0, 0x1, 0x400}, r2, 0x4, 0xffffffffffffffff, 0x64f7ac62296d4d96) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x82) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) epoll_pwait(r5, &(0x7f00000004c0)=[{}, {}, {}, {}, {}], 0x5, 0x5, &(0x7f0000000500)={0x2}, 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) setsockopt$sock_int(r9, 0x1, 0x1, &(0x7f0000000540)=0x6, 0x4) r10 = dup(r8) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x17, 0x7f1, 0x3, 0xfffffffb, 0x40, 0xffffffffffffffff, 0x5, [], 0x0, 0xffffffffffffffff, 0x3, 0x5}, 0x3c) r12 = gettid() ptrace$setopts(0x4206, r12, 0x0, 0x0) tkill(r12, 0x3b) ptrace$setregs(0xd, r12, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r12, 0x0, 0x0) write$binfmt_aout(r11, &(0x7f0000000280)=ANY=[], 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_DISABLE(r10, 0x2401, 0x7fff) ioctl$TIOCLINUX4(r3, 0x541c, &(0x7f0000000080)) clone(0x20986100, 0x0, 0x0, 0x0, &(0x7f0000000100)="d353ff072d68b2e4dc14aa5fa8b3d94c22") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = dup(r13) r15 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) prctl$PR_GET_SECUREBITS(0x1b) keyctl$set_timeout(0xf, r15, 0x0) r16 = add_key$keyring(&(0x7f0000000440)='keyring\x00', &(0x7f0000000480)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$reject(0x13, r15, 0xbf, 0xb0, r16) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) 19:16:16 executing program 0: r0 = socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockname(r0, &(0x7f00000001c0)=@rc, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) rmdir(&(0x7f0000000240)='./file0\x00') unlinkat(r2, &(0x7f0000000140)='./file0\x00', 0x300) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x100000000000a, 0x0) ioctl$sock_TIOCINQ(r3, 0x541b, &(0x7f0000000100)) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x1d8) dup2(r4, r2) ioctl$TCSETSF(r3, 0x5404, &(0x7f0000000380)={0x4, 0x0, 0x0, 0x899, 0xd, 0x0, 0x1c, 0x1f, 0x0, 0x18c, 0x1, 0x200}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) r5 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r5, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:16 executing program 3: r0 = socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockname(r0, &(0x7f00000001c0)=@rc, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) rmdir(&(0x7f0000000240)='./file0\x00') unlinkat(r2, &(0x7f0000000140)='./file0\x00', 0x300) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x100000000000a, 0x0) ioctl$sock_TIOCINQ(r3, 0x541b, &(0x7f0000000100)) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x1d8) dup2(r4, r2) ioctl$TCSETSF(r3, 0x5404, &(0x7f0000000380)={0x4, 0x0, 0x0, 0x899, 0xd, 0x0, 0x1c, 0x1f, 0x0, 0x18c, 0x1, 0x200}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$FS_IOC_SETVERSION(r6, 0x40087602, &(0x7f00000002c0)=0xffffffffffff7fff) r7 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r7, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:16 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r8 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r9 = dup2(0xffffffffffffffff, r8) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r10 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r9, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(r1, r10, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:16 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, 0x0) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r4, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r4, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r5 = socket(0x9, 0xfffffffffffffffd, 0x8) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r7 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r8 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r9 = dup2(0xffffffffffffffff, r8) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r10 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r9, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r5, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r10, 0x80003) sendfile(r1, r10, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:16 executing program 5: prctl$PR_CAPBSET_READ(0x17, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCGLCKTRMIOS(r1, 0x5456, &(0x7f0000000000)={0x4476, 0x7, 0x0, 0x80000001, 0xf, 0x3f, 0x8, 0x4, 0x6, 0x5, 0x10001, 0xffff}) [ 826.607162] EXT4-fs (loop5): journaled quota format not specified [ 826.636568] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" 19:16:16 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000040)={'bridge_slave_0\x00'}) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0xd15de47873522c9, 0x5, 0x20, 0x0, 0x0, 0xffffffffffffffff, 0x7, [], 0x0, r2, 0x5, 0xfffffffc}, 0x3c) flistxattr(r3, &(0x7f0000000300)=""/177, 0xb1) [ 826.670892] EXT4-fs (loop5): journaled quota format not specified 19:16:16 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r8 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r9 = dup2(0xffffffffffffffff, r8) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r10 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r9, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(r1, r10, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:17 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0x0, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:17 executing program 3: r0 = socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockname(r0, &(0x7f00000001c0)=@rc, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) rmdir(&(0x7f0000000240)='./file0\x00') unlinkat(r2, &(0x7f0000000140)='./file0\x00', 0x300) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x100000000000a, 0x0) ioctl$sock_TIOCINQ(r3, 0x541b, &(0x7f0000000100)) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x1d8) dup2(r4, r2) ioctl$TCSETSF(r3, 0x5404, &(0x7f0000000380)={0x4, 0x0, 0x0, 0x899, 0xd, 0x0, 0x1c, 0x1f, 0x0, 0x18c, 0x1, 0x200}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$FS_IOC_SETVERSION(r6, 0x40087602, &(0x7f00000002c0)=0xffffffffffff7fff) readv(0xffffffffffffffff, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 826.788998] EXT4-fs (loop5): journaled quota format not specified [ 826.812416] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" 19:16:17 executing program 0: r0 = socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockname(r0, &(0x7f00000001c0)=@rc, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) rmdir(&(0x7f0000000240)='./file0\x00') unlinkat(r2, &(0x7f0000000140)='./file0\x00', 0x300) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x100000000000a, 0x0) ioctl$sock_TIOCINQ(r3, 0x541b, &(0x7f0000000100)) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x1d8) dup2(r4, r2) ioctl$TCSETSF(r3, 0x5404, &(0x7f0000000380)={0x4, 0x0, 0x0, 0x899, 0xd, 0x0, 0x1c, 0x1f, 0x0, 0x18c, 0x1, 0x200}) r5 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r5, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 826.840321] EXT4-fs (loop5): journaled quota format not specified 19:16:17 executing program 3: r0 = socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockname(r0, &(0x7f00000001c0)=@rc, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) rmdir(&(0x7f0000000240)='./file0\x00') unlinkat(r2, &(0x7f0000000140)='./file0\x00', 0x300) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x100000000000a, 0x0) ioctl$sock_TIOCINQ(r3, 0x541b, &(0x7f0000000100)) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x1d8) dup2(r4, r2) ioctl$TCSETSF(r3, 0x5404, &(0x7f0000000380)={0x4, 0x0, 0x0, 0x899, 0xd, 0x0, 0x1c, 0x1f, 0x0, 0x18c, 0x1, 0x200}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$FS_IOC_SETVERSION(r6, 0x40087602, &(0x7f00000002c0)=0xffffffffffff7fff) readv(0xffffffffffffffff, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:17 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='uid_map\x00') r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) sendfile(r1, r0, 0x0, 0x6f0a77bd) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f00000000c0)='uid_map\x00') r5 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$EVIOCSMASK(r5, 0x40104593, &(0x7f0000000080)={0x1f, 0x20, &(0x7f0000000040)="4b9ae63d1a70ce6fe86ab541dc41abde2472a3fdb1173a500afed169310a7484"}) 19:16:17 executing program 5: prctl$PR_CAPBSET_READ(0x17, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCGLCKTRMIOS(r1, 0x5456, &(0x7f0000000000)={0x4476, 0x7, 0x0, 0x80000001, 0xf, 0x3f, 0x8, 0x4, 0x6, 0x5, 0x10001, 0xffff}) 19:16:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0x7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x8) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r0 = socket$inet6(0xa, 0x0, 0xff) chroot(&(0x7f0000000000)='./file0\x00') ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b") getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r1) r2 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r2, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) [ 827.082451] EXT4-fs (loop5): journaled quota format not specified 19:16:17 executing program 3: r0 = socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockname(r0, &(0x7f00000001c0)=@rc, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) rmdir(&(0x7f0000000240)='./file0\x00') unlinkat(r2, &(0x7f0000000140)='./file0\x00', 0x300) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x100000000000a, 0x0) ioctl$sock_TIOCINQ(r3, 0x541b, &(0x7f0000000100)) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x1d8) dup2(r4, r2) ioctl$TCSETSF(r3, 0x5404, &(0x7f0000000380)={0x4, 0x0, 0x0, 0x899, 0xd, 0x0, 0x1c, 0x1f, 0x0, 0x18c, 0x1, 0x200}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$FS_IOC_SETVERSION(r6, 0x40087602, &(0x7f00000002c0)=0xffffffffffff7fff) readv(0xffffffffffffffff, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 827.136232] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" 19:16:17 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) socket(0x10, 0x3, 0x0) r7 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r8 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r9 = dup2(0xffffffffffffffff, r8) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r10 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r9, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(r1, r10, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 827.181907] EXT4-fs (loop5): journaled quota format not specified 19:16:17 executing program 3: r0 = socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockname(r0, &(0x7f00000001c0)=@rc, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) rmdir(&(0x7f0000000240)='./file0\x00') unlinkat(r2, &(0x7f0000000140)='./file0\x00', 0x300) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x100000000000a, 0x0) ioctl$sock_TIOCINQ(r3, 0x541b, &(0x7f0000000100)) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x1d8) dup2(r4, r2) ioctl$TCSETSF(r3, 0x5404, &(0x7f0000000380)={0x4, 0x0, 0x0, 0x899, 0xd, 0x0, 0x1c, 0x1f, 0x0, 0x18c, 0x1, 0x200}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r7, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:17 executing program 5: prctl$PR_CAPBSET_READ(0x17, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCGLCKTRMIOS(r1, 0x5456, &(0x7f0000000000)={0x4476, 0x7, 0x0, 0x80000001, 0xf, 0x3f, 0x8, 0x4, 0x6, 0x5, 0x10001, 0xffff}) 19:16:17 executing program 0: r0 = socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockname(r0, &(0x7f00000001c0)=@rc, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) rmdir(&(0x7f0000000240)='./file0\x00') unlinkat(r2, &(0x7f0000000140)='./file0\x00', 0x300) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x100000000000a, 0x0) ioctl$sock_TIOCINQ(r3, 0x541b, &(0x7f0000000100)) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x1d8) dup2(r4, r2) r5 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r5, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:17 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0x0, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:17 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r8 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r9 = dup2(0xffffffffffffffff, r8) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r10 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r9, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(r1, r10, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 827.438183] EXT4-fs (loop5): journaled quota format not specified 19:16:17 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) socket(0x10, 0x3, 0x0) r7 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r8 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r9 = dup2(0xffffffffffffffff, r8) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r10 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r9, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(r1, r10, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 827.507110] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" [ 827.527741] EXT4-fs (loop5): journaled quota format not specified 19:16:17 executing program 5: prctl$PR_CAPBSET_READ(0x17, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCGLCKTRMIOS(r1, 0x5456, &(0x7f0000000000)={0x4476, 0x7, 0x0, 0x80000001, 0xf, 0x3f, 0x8, 0x4, 0x6, 0x5, 0x10001, 0xffff}) 19:16:18 executing program 3: r0 = socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockname(r0, &(0x7f00000001c0)=@rc, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) rmdir(&(0x7f0000000240)='./file0\x00') unlinkat(r2, &(0x7f0000000140)='./file0\x00', 0x300) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x100000000000a, 0x0) ioctl$sock_TIOCINQ(r3, 0x541b, &(0x7f0000000100)) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x1d8) dup2(r4, r2) ioctl$TCSETSF(r3, 0x5404, &(0x7f0000000380)={0x4, 0x0, 0x0, 0x899, 0xd, 0x0, 0x1c, 0x1f, 0x0, 0x18c, 0x1, 0x200}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) r6 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r6, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 827.737311] EXT4-fs (loop5): journaled quota format not specified [ 827.751784] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" [ 827.770588] EXT4-fs (loop5): journaled quota format not specified 19:16:18 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x145000, 0x152) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r2, 0x208200) r3 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VT_DISALLOCATE(r5, 0x5608) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r3, 0x0) read(r3, &(0x7f0000000180)=""/19, 0xfffffe47) 19:16:18 executing program 5: prctl$PR_CAPBSET_READ(0x17, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:18 executing program 0: r0 = socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockname(r0, &(0x7f00000001c0)=@rc, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) rmdir(&(0x7f0000000240)='./file0\x00') unlinkat(r2, &(0x7f0000000140)='./file0\x00', 0x300) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x100000000000a, 0x0) ioctl$sock_TIOCINQ(r3, 0x541b, &(0x7f0000000100)) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x1d8) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r4, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:18 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) socket(0x10, 0x3, 0x0) r7 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r8 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r9 = dup2(0xffffffffffffffff, r8) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r10 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r9, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(r1, r10, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:18 executing program 4: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") write$binfmt_elf64(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3c) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x3200) r1 = gettid() tkill(r1, 0x10010000000032) [ 827.974667] EXT4-fs (loop5): journaled quota format not specified [ 828.003924] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" [ 828.046277] EXT4-fs (loop5): journaled quota format not specified 19:16:18 executing program 4: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) io_setup(0x7, &(0x7f0000000100)) io_setup(0x5, &(0x7f0000000140)=0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000005c0)={0x1, &(0x7f0000000580)=[{0x80, 0x2, 0x1, 0x9}]}) r7 = socket$inet6_udplite(0xa, 0x2, 0x88) r8 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000880)='/selinux/enforce\x00', 0x8580, 0x0) io_submit(r1, 0x8, &(0x7f0000000a80)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x7cc215dc73da5571, 0x1, r0, &(0x7f00000003c0)="41e92ffdd3759d508e1b6cb2fc22b33cad5196c3543cee430e32957a91ec1ced6a4f7690cb8c39e5d17911510014a2a1da2f232e79e0c1022e6a0a78611ae0b6fbaf54ab38e4e44edc87cc455b310edddedd3ba53ab92eff22c352eb58afb5154e5be5a9f76b521f44a180050968cba49c24ee270484143a56b547b2fad5f6480c94083904642f06442888809430f1970671584e91edb742b48620ffe80aa9661aba1c53c172480ce92c417e7d8003b984b2110a28bd3b73eafcfaeca4f6c21cb644aaa72677a8150fd53312d03e51821d8a15", 0xd3, 0x1000, 0x0, 0x1, r3}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x6, 0x7, r0, &(0x7f00000002c0)="a405d492e61792e238db311765b0879f19b8c2ea1636e31ede7b907926bf78c190394463baa8f1b5c5521c1d2e068fa252667d306e04dcbf5f09132b64efbd1d0d52fcd89ef50d4ab2856c23f978d30832dd4865bce82dfd152690597a9f5442b446ef7e9fa33ea9cbb367c15bcc935ed7abbd2fe7e44e9083deead29c83cc692b0b0496c1d4dbc4580fb6bbdcdce6ef8bb6cda8f719bbc119a6a3", 0x9b, 0x6, 0x0, 0x2}, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x5, 0x4, r5, &(0x7f0000000b00)="f9c98da0dfd65b4d3f4f82810d8d02e82e061172051a343dc3ebb4e1d89ae9edad5104503142a515b7a2a6f4488ca089818de8bff9d6a2ef3ab9ef2cfde5fb47e791bae38f9952d50aebd15dca53375fad14cdf17b7b32c1a5f4b60681e465968d91ec6c45989139c97abce034d38081af9fe3c869ad2d3793efb4c96591765d0a8a1f5342d0bbc5fe18fadbcd399c64f7f5d357f2b9e80bc4ba6daa0e2960e2282111cfac06979caa73fc33062f74ccaa6c305bd10f1dbc3a924e73cd285ec531726e241b21392b66c5c30f7113a001838aa50832ac2fb81f844560db0f0b80cf80a13d567087019c3de51d491b5b5d1b3732", 0xf3, 0x1ff, 0x0, 0x3, r0}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x6, 0x7fff, r6, &(0x7f0000000600)="ff5a4d11831e4b642ec36d816ef357b66507e1f7de4cbb07120b4a2364c3a58c654ef197e536fdb5fa0ca9a203aaaaf5176db55957aa3aae3fb85236db6743ee5c3233239c85a4aff4dc45f0251bcb74bfd5e7", 0x53, 0x401}, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x5, 0x5, r7, &(0x7f00000006c0)="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", 0xfd, 0x800}, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x7, r0, &(0x7f0000000800)="534b4adc56241e11199c8b72c8f660b012daf043a97d01944ec038c9cbc00f35c09186dd885eeb7f559dae48dac5b4aa93492a8446d1bf4e77628dd1337b36ccb5136df678aca4cb34794f4211ffcd7da023da96a711b8aea68efe0af66fdfcd7b729b58da49341f704015d08c40f304ee9380cabff96e9beb65de6cd3a64f", 0x7f, 0x0, 0x0, 0x0, r8}, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x3, 0x200, r0, &(0x7f0000000900)="9285f956dbf08d9c27174ced28", 0xd, 0x6, 0x0, 0x6, r0}, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x2, 0xffe1, r0, &(0x7f0000000980)="13038a124573ffc064db66c753c56f040b239d6e55927f1b4ac80b1fc40bb2a55134354bf27cfcf2f9798c2cf190bf675619ecccbdce68eda513cabb31d4224a6e024240683237025f7e187b81fea683181e57ba9a1fdfcd4d2cd81cb77f3b2103647189dec3f9ad911694bc34446aa5907ea0d60f667503a94bd19961317dc0fe0d1443e98c6040fb6baaddbd6404a0ceeb8a3ce6", 0x95, 0x100}]) creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r9, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000dc0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r11) getsockopt$SO_TIMESTAMPING(r11, 0x1, 0x41, &(0x7f0000000040), &(0x7f0000000e00)=0x4) r12 = dup(r10) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) fcntl$setstatus(r0, 0x4, 0x46600) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x2}]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r13) vmsplice(r13, &(0x7f0000000500)=[{&(0x7f00000001c0)="d607dd483545af51be657b39ff7f03919a81c178257ad28867dae389a84825ab48c32cf1e46f4d9f7da8f54f880e8039bffaed462d142db4fba50ead1e8c7ee97fafdf3c448864871287b0166eb1dda0307b55da68390356195d9a08a14b23eb4544a71968e716cccc5e317206870720f750660d9aef0e336bd735953773", 0x7e}, {&(0x7f0000000240)="58e6785e6e19aea03a4a77968247ba5d68033d588d2f403514757fdc0f401f", 0x1f}, {&(0x7f0000000c00)="c3515e7ef7ec6c0020c2fc376f60e66f875bfb63b4be99a6a20f011705df6d0294608d5a8c1de0b978697bb2089ba0a81795891f8e5c21e1be2a416304a8b3ddabf69badb2f6b478b630b22527dc47a43388861d745ffeecabc823df9474a36c8f073847ec15fa9bcdab5452b72e1bdb19d1e780cf47b66226894d9af5726542434ddea80f62d12dab479bbb053b5b777e31bd7f21e1b43be00e015a44b2c8630b5878026dccf085437b282f07729259767e", 0xb2}, {&(0x7f0000000cc0)="8fc4847666e2b815613be1ca1c8486c56ca8a3bc36a99dd5f9d2e297a5a7e5bca72c22fb4b7d8d2a931489a0826725eff0453ba81ae9632ec097f389b435418c75b051499ed73cb18898d85e8b670b1e47e435365ba10779c1d2e2fa13e5e3d01f718cd71469e9898d6ca43f2b8736c58ae6082be101105ea2cb9dbc4ce9789e66462b4a23cd15d49aa45d952de580cd1c403f4d0e9f27e7934c1f15c74585a8faccf2a0c1a12e348c490339559388e407b2787ba07a510c4b", 0xb9}], 0x4, 0x15) openat$ion(0xffffffffffffff9c, &(0x7f0000000d80)='/dev/ion\x00', 0x101000, 0x0) 19:16:18 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0x0, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:18 executing program 5: prctl$PR_CAPBSET_READ(0x17, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) 19:16:18 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r7 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r8 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r9 = dup2(0xffffffffffffffff, r8) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r10 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r9, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(r1, r10, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:18 executing program 0: r0 = socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockname(r0, &(0x7f00000001c0)=@rc, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) rmdir(&(0x7f0000000240)='./file0\x00') unlinkat(r2, &(0x7f0000000140)='./file0\x00', 0x300) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x100000000000a, 0x0) ioctl$sock_TIOCINQ(r3, 0x541b, &(0x7f0000000100)) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r4, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:18 executing program 3: r0 = socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockname(r0, &(0x7f00000001c0)=@rc, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) rmdir(&(0x7f0000000240)='./file0\x00') unlinkat(r2, &(0x7f0000000140)='./file0\x00', 0x300) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x100000000000a, 0x0) ioctl$sock_TIOCINQ(r3, 0x541b, &(0x7f0000000100)) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x1d8) dup2(r4, r2) ioctl$TCSETSF(r3, 0x5404, &(0x7f0000000380)={0x4, 0x0, 0x0, 0x899, 0xd, 0x0, 0x1c, 0x1f, 0x0, 0x18c, 0x1, 0x200}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) r5 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r5, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 828.257679] EXT4-fs (loop5): journaled quota format not specified [ 828.287318] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" [ 828.296295] EXT4-fs (loop5): journaled quota format not specified 19:16:18 executing program 5: prctl$PR_CAPBSET_READ(0x17, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) 19:16:18 executing program 4: prctl$PR_CAPBSET_READ(0x17, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 828.485386] EXT4-fs (loop5): journaled quota format not specified 19:16:18 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, 0x0, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 828.528558] EXT4-fs (loop4): journaled quota format not specified [ 828.541492] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" [ 828.568328] EXT4-fs (loop4): failed to parse options in superblock: usrjquota=" 19:16:18 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r7 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r8 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r9 = dup2(0xffffffffffffffff, r8) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r10 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r9, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(r1, r10, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 828.601574] EXT4-fs (loop5): journaled quota format not specified [ 828.639528] EXT4-fs (loop4): journaled quota format not specified 19:16:18 executing program 5: prctl$PR_CAPBSET_READ(0x17, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) 19:16:18 executing program 4: prctl$PR_CAPBSET_READ(0x17, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:19 executing program 3: r0 = socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockname(r0, &(0x7f00000001c0)=@rc, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) rmdir(&(0x7f0000000240)='./file0\x00') unlinkat(r2, &(0x7f0000000140)='./file0\x00', 0x300) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x100000000000a, 0x0) ioctl$sock_TIOCINQ(r3, 0x541b, &(0x7f0000000100)) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x1d8) dup2(r4, r2) ioctl$TCSETSF(r3, 0x5404, &(0x7f0000000380)={0x4, 0x0, 0x0, 0x899, 0xd, 0x0, 0x1c, 0x1f, 0x0, 0x18c, 0x1, 0x200}) r5 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r5, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 828.799840] EXT4-fs (loop5): journaled quota format not specified [ 828.817898] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" 19:16:19 executing program 0: r0 = socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockname(r0, &(0x7f00000001c0)=@rc, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) rmdir(&(0x7f0000000240)='./file0\x00') unlinkat(r2, &(0x7f0000000140)='./file0\x00', 0x300) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x100000000000a, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r4, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:19 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r7 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r8 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r9 = dup2(0xffffffffffffffff, r8) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r10 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r9, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(r1, r10, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 828.848042] EXT4-fs (loop5): journaled quota format not specified [ 828.864967] EXT4-fs (loop4): journaled quota format not specified [ 828.885236] EXT4-fs (loop4): failed to parse options in superblock: usrjquota=" 19:16:19 executing program 5: prctl$PR_CAPBSET_READ(0x17, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 828.931504] EXT4-fs (loop4): journaled quota format not specified 19:16:19 executing program 4: prctl$PR_CAPBSET_READ(0x17, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 829.084577] EXT4-fs (loop5): journaled quota format not specified [ 829.109218] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" [ 829.143124] EXT4-fs (loop5): journaled quota format not specified [ 829.177691] EXT4-fs (loop4): journaled quota format not specified 19:16:19 executing program 5: prctl$PR_CAPBSET_READ(0x17, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 829.219832] EXT4-fs (loop4): failed to parse options in superblock: usrjquota=" [ 829.260532] EXT4-fs (loop4): journaled quota format not specified 19:16:19 executing program 3: r0 = socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockname(r0, &(0x7f00000001c0)=@rc, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) rmdir(&(0x7f0000000240)='./file0\x00') unlinkat(r2, &(0x7f0000000140)='./file0\x00', 0x300) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x100000000000a, 0x0) ioctl$sock_TIOCINQ(r3, 0x541b, &(0x7f0000000100)) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x1d8) dup2(r4, r2) r5 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r5, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:19 executing program 4: prctl$PR_CAPBSET_READ(0x17, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) [ 829.339725] EXT4-fs (loop5): journaled quota format not specified [ 829.376528] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" 19:16:19 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r7 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r8 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r9 = dup2(0xffffffffffffffff, r8) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r10 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r9, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(r1, r10, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:19 executing program 0: r0 = socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockname(r0, &(0x7f00000001c0)=@rc, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) rmdir(&(0x7f0000000240)='./file0\x00') unlinkat(r2, &(0x7f0000000140)='./file0\x00', 0x300) pipe(&(0x7f0000000280)) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r3, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:19 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, 0x0, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 829.421933] EXT4-fs (loop5): journaled quota format not specified 19:16:19 executing program 5: prctl$PR_CAPBSET_READ(0x17, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 829.513796] EXT4-fs (loop4): journaled quota format not specified [ 829.540512] EXT4-fs (loop4): failed to parse options in superblock: usrjquota=" [ 829.575237] EXT4-fs (loop4): journaled quota format not specified [ 829.618497] EXT4-fs (loop5): journaled quota format not specified 19:16:19 executing program 4: prctl$PR_CAPBSET_READ(0x17, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) [ 829.668801] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" [ 829.713898] EXT4-fs (loop5): journaled quota format not specified 19:16:20 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r7 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r8 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r9 = dup2(0xffffffffffffffff, r8) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r10 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r9, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(r1, r10, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:20 executing program 3: r0 = socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockname(r0, &(0x7f00000001c0)=@rc, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) rmdir(&(0x7f0000000240)='./file0\x00') unlinkat(r2, &(0x7f0000000140)='./file0\x00', 0x300) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x100000000000a, 0x0) ioctl$sock_TIOCINQ(r3, 0x541b, &(0x7f0000000100)) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x1d8) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r4, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:20 executing program 5: prctl$PR_CAPBSET_READ(0x17, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 19:16:20 executing program 0: r0 = socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockname(r0, &(0x7f00000001c0)=@rc, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) rmdir(&(0x7f0000000240)='./file0\x00') unlinkat(r2, &(0x7f0000000140)='./file0\x00', 0x300) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r3, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 829.817430] EXT4-fs (loop4): journaled quota format not specified [ 829.854815] EXT4-fs (loop4): failed to parse options in superblock: usrjquota=" [ 829.889198] EXT4-fs (loop4): journaled quota format not specified [ 829.903776] EXT4-fs (loop5): journaled quota format not specified 19:16:20 executing program 4: prctl$PR_CAPBSET_READ(0x17, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) 19:16:20 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, 0x0, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 829.956438] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" [ 829.989580] EXT4-fs (loop5): journaled quota format not specified 19:16:20 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r7 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r8 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r9 = dup2(0xffffffffffffffff, r8) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r10 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r9, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(r1, r10, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:20 executing program 5: prctl$PR_CAPBSET_READ(0x17, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 830.085059] EXT4-fs (loop4): journaled quota format not specified [ 830.117271] EXT4-fs (loop4): failed to parse options in superblock: usrjquota=" 19:16:20 executing program 3: r0 = socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockname(r0, &(0x7f00000001c0)=@rc, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) rmdir(&(0x7f0000000240)='./file0\x00') unlinkat(r2, &(0x7f0000000140)='./file0\x00', 0x300) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x100000000000a, 0x0) ioctl$sock_TIOCINQ(r3, 0x541b, &(0x7f0000000100)) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r4, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 830.166006] EXT4-fs (loop4): journaled quota format not specified [ 830.218689] EXT4-fs (loop5): journaled quota format not specified [ 830.232074] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" 19:16:20 executing program 4: prctl$PR_CAPBSET_READ(0x17, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 830.265937] EXT4-fs (loop5): journaled quota format not specified 19:16:20 executing program 5: prctl$PR_CAPBSET_READ(0x17, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 19:16:20 executing program 0: r0 = socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockname(r0, &(0x7f00000001c0)=@rc, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) rmdir(&(0x7f0000000240)='./file0\x00') r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r3, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:20 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r7 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r8 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r9 = dup2(0xffffffffffffffff, r8) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r10 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r9, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(r1, r10, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 830.391502] EXT4-fs (loop4): journaled quota format not specified [ 830.426841] EXT4-fs (loop4): failed to parse options in superblock: usrjquota=" [ 830.476510] EXT4-fs (loop5): journaled quota format not specified [ 830.488818] EXT4-fs (loop4): journaled quota format not specified [ 830.508600] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" [ 830.547431] EXT4-fs (loop5): journaled quota format not specified 19:16:20 executing program 4: prctl$PR_CAPBSET_READ(0x17, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 19:16:20 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:20 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r7 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r8 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r9 = dup2(0xffffffffffffffff, r8) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r10 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r9, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(r1, r10, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:21 executing program 3: r0 = socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockname(r0, &(0x7f00000001c0)=@rc, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) rmdir(&(0x7f0000000240)='./file0\x00') unlinkat(r2, &(0x7f0000000140)='./file0\x00', 0x300) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x100000000000a, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r4, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 830.713208] EXT4-fs (loop4): journaled quota format not specified [ 830.746082] EXT4-fs (loop4): failed to parse options in superblock: usrjquota=" [ 830.754475] EXT4-fs (loop5): journaled quota format not specified 19:16:21 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x0, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:21 executing program 0: r0 = socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockname(r0, &(0x7f00000001c0)=@rc, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r3, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 830.780638] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" [ 830.790537] EXT4-fs (loop4): journaled quota format not specified [ 830.809928] EXT4-fs (loop5): journaled quota format not specified 19:16:21 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:21 executing program 4: prctl$PR_CAPBSET_READ(0x17, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 19:16:21 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r7 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r8 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r9 = dup2(0xffffffffffffffff, r8) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r10 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r9, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(r1, r10, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 831.058755] EXT4-fs (loop4): journaled quota format not specified 19:16:21 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 831.099843] EXT4-fs (loop4): failed to parse options in superblock: usrjquota=" [ 831.137409] EXT4-fs (loop4): journaled quota format not specified 19:16:21 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:21 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x0, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:21 executing program 3: r0 = socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockname(r0, &(0x7f00000001c0)=@rc, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) rmdir(&(0x7f0000000240)='./file0\x00') unlinkat(r2, &(0x7f0000000140)='./file0\x00', 0x300) pipe(&(0x7f0000000280)) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r3, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:21 executing program 4: prctl$PR_CAPBSET_READ(0x17, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 19:16:21 executing program 0: r0 = socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockname(r0, &(0x7f00000001c0)=@rc, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 831.354842] EXT4-fs (loop4): journaled quota format not specified [ 831.386035] EXT4-fs (loop4): failed to parse options in superblock: usrjquota=" 19:16:21 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:21 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r4, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r6 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r7 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r8 = dup2(0xffffffffffffffff, r7) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r9 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r8, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(r1, r9, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 831.422648] EXT4-fs (loop4): journaled quota format not specified 19:16:21 executing program 4: prctl$PR_CAPBSET_READ(0x17, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 19:16:21 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 831.656324] EXT4-fs (loop4): journaled quota format not specified 19:16:21 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 831.700303] EXT4-fs (loop4): failed to parse options in superblock: usrjquota=" 19:16:21 executing program 3: r0 = socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockname(r0, &(0x7f00000001c0)=@rc, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) rmdir(&(0x7f0000000240)='./file0\x00') unlinkat(r2, &(0x7f0000000140)='./file0\x00', 0x300) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r3, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:22 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:22 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r4, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r6 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r7 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r8 = dup2(0xffffffffffffffff, r7) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r9 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r8, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(r1, r9, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 831.744489] EXT4-fs (loop4): journaled quota format not specified 19:16:22 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x0, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:22 executing program 0: r0 = socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockname(r0, &(0x7f00000001c0)=@rc, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:22 executing program 4: prctl$PR_CAPBSET_READ(0x17, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 831.939749] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 19:16:22 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 832.013169] EXT4-fs (loop4): journaled quota format not specified [ 832.064074] EXT4-fs (loop4): failed to parse options in superblock: usrjquota=" [ 832.097092] EXT4-fs (loop4): journaled quota format not specified [ 832.125625] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 19:16:22 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:22 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:22 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r4, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r6 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r7 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r8 = dup2(0xffffffffffffffff, r7) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r9 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r8, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(r1, r9, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 832.243458] EXT4-fs (loop4): journaled quota format not specified [ 832.273897] EXT4-fs (loop4): failed to parse options in superblock: usrjquota=" 19:16:22 executing program 3: r0 = socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockname(r0, &(0x7f00000001c0)=@rc, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) rmdir(&(0x7f0000000240)='./file0\x00') r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r3, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 832.305103] EXT4-fs (loop4): journaled quota format not specified [ 832.332136] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 19:16:22 executing program 0: r0 = socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockname(r0, &(0x7f00000001c0)=@rc, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:22 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:22 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 832.550437] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 19:16:22 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:23 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x0, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:23 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:23 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:23 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r6 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r7 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r8 = dup2(0xffffffffffffffff, r7) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r9 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r8, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(r1, r9, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:23 executing program 3: r0 = socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockname(r0, &(0x7f00000001c0)=@rc, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r3, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:23 executing program 0: r0 = socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockname(r0, &(0x7f00000001c0)=@rc, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r1, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 832.869631] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 19:16:23 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:23 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 833.068510] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 19:16:23 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:23 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:23 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r6 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r7 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r8 = dup2(0xffffffffffffffff, r7) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r9 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r8, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(r1, r9, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:23 executing program 3: r0 = socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockname(r0, &(0x7f00000001c0)=@rc, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 833.260184] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 19:16:23 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x0, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:23 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:23 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:23 executing program 0: r0 = socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockname(r0, &(0x7f00000001c0)=@rc, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r1, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:23 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r6 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r7 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r8 = dup2(0xffffffffffffffff, r7) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r9 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r8, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(r1, r9, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:23 executing program 3: r0 = socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockname(r0, &(0x7f00000001c0)=@rc, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 833.583760] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 19:16:23 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:23 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 833.762991] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 833.770154] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 19:16:24 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080), 0x0, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:24 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:24 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r5 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r6 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r7 = dup2(0xffffffffffffffff, r6) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r8 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r7, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(r1, r8, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:24 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x0, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:24 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080), 0x0, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:24 executing program 0: r0 = socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockname(r0, &(0x7f00000001c0)=@rc, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r1, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 833.982176] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 834.005895] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 19:16:24 executing program 3: r0 = socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockname(r0, &(0x7f00000001c0)=@rc, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:24 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080), 0x0, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:24 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 834.124918] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 834.262105] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 834.271703] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 19:16:24 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:24 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x0, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:24 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r5 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r6 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r7 = dup2(0xffffffffffffffff, r6) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r8 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r7, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(r1, r8, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:24 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea87294", 0x1d, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:24 executing program 0: r0 = socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockname(r0, &(0x7f00000001c0)=@rc, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 834.439824] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 834.450510] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 19:16:24 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea87294", 0x1d, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:24 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:24 executing program 3: r0 = socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockname(r0, &(0x7f00000001c0)=@rc, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r1, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:24 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r5 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r6 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r7 = dup2(0xffffffffffffffff, r6) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r8 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r7, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(r1, r8, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 834.636325] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 834.660161] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 19:16:24 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:25 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea87294", 0x1d, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 834.846673] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 834.849485] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 19:16:25 executing program 0: r0 = socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockname(r0, &(0x7f00000001c0)=@rc, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:25 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e", 0x2c, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:25 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x0, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:25 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:25 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r5 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r6 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r7 = dup2(0xffffffffffffffff, r6) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r8 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r7, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(r1, r8, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 835.071297] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 835.080772] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 19:16:25 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e", 0x2c, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:25 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:25 executing program 3: r0 = socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockname(r0, &(0x7f00000001c0)=@rc, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r1, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 835.214997] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 835.255015] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 19:16:25 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e", 0x2c, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:25 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r5 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r6 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r7 = dup2(0xffffffffffffffff, r6) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r8 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r7, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(r1, r8, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:25 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:25 executing program 0: r0 = socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockname(r0, &(0x7f00000001c0)=@rc, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 835.428693] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 19:16:25 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863c", 0x33, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 835.501553] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 19:16:25 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080), 0x0, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 835.589897] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 835.639889] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 19:16:26 executing program 3: r0 = socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockname(r0, &(0x7f00000001c0)=@rc, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r1, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:26 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r5 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r6 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r7 = dup2(0xffffffffffffffff, r6) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r8 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r7, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(r1, r8, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:26 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863c", 0x33, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:26 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x0, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:26 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080), 0x0, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:26 executing program 0: socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 835.822885] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 835.825759] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 19:16:26 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080), 0x0, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:26 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863c", 0x33, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:26 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r5 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r6 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r7 = dup2(0xffffffffffffffff, r6) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r8 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r7, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(r1, r8, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 836.000929] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 19:16:26 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea87294", 0x1d, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 836.059754] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 19:16:26 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc676", 0x37, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 836.179033] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 19:16:26 executing program 3: r0 = socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockname(r0, &(0x7f00000001c0)=@rc, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:26 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea87294", 0x1d, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 836.222776] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 19:16:26 executing program 0: socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:26 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc676", 0x37, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 836.313541] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 836.378462] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 19:16:26 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:26 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r5 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r6 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r7 = dup2(0xffffffffffffffff, r6) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r8 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r7, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(r1, r8, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:26 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea87294", 0x1d, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:26 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc676", 0x37, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 836.513488] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 836.558046] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 19:16:26 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e", 0x2c, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:26 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253", 0x39, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:26 executing program 3: r0 = socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockname(r0, &(0x7f00000001c0)=@rc, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 836.676647] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 836.693546] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 19:16:26 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r5 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r6 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r7 = dup2(0xffffffffffffffff, r6) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r8 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r7, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(r1, r8, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:27 executing program 0: socket(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:27 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e", 0x2c, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:27 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253", 0x39, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 836.883586] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 836.889863] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 19:16:27 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e", 0x2c, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 837.055050] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 19:16:27 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:27 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863c", 0x33, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:27 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253", 0x39, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:27 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:27 executing program 3: r0 = socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockname(r0, &(0x7f00000001c0)=@rc, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:27 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r5 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r6 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r7 = dup2(0xffffffffffffffff, r6) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r8 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r7, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(r1, r8, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 837.216972] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 837.240198] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 19:16:27 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x3a}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:27 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863c", 0x33, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:27 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r5 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r6 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r7 = dup2(0xffffffffffffffff, r6) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r8 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r7, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(r1, r8, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 837.402604] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 837.428787] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 19:16:27 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x3a}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:27 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863c", 0x33, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:27 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 837.558736] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 837.586519] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 19:16:28 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:28 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x3a}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:28 executing program 3: socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:28 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc676", 0x37, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:28 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r5 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r6 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r7 = dup2(0xffffffffffffffff, r6) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r8 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r7, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(r1, r8, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:28 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 837.853078] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 837.859190] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 19:16:28 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x3a, 0x400}], 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:28 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc676", 0x37, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:28 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r5 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r6 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r7 = dup2(0xffffffffffffffff, r6) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r8 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r7, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(r1, r8, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:28 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 838.021102] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 838.042038] EXT4-fs (loop5): Unsupported filesystem blocksize 0 (1923657432 log_block_size) 19:16:28 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc676", 0x37, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:28 executing program 3: socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:28 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x3a, 0x400}], 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:28 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 838.168039] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 19:16:28 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253", 0x39, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:28 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r5 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r6 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r7 = dup2(0xffffffffffffffff, r6) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r8 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r7, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(r1, r8, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 838.287870] EXT4-fs (loop5): Unsupported filesystem blocksize 0 (1923657432 log_block_size) [ 838.327760] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 19:16:28 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x3a, 0x400}], 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:28 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253", 0x39, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 838.498491] EXT4-fs (loop5): Unsupported filesystem blocksize 0 (1923657432 log_block_size) [ 838.522364] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 19:16:28 executing program 0: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r1, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:28 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:28 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253", 0x39, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 838.668777] EXT4-fs (loop5): Unsupported filesystem blocksize 0 (1923657432 log_block_size) [ 838.733243] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 19:16:29 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:29 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:29 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r5 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r6 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r7 = dup2(0xffffffffffffffff, r6) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r8 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r7, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(r1, r8, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:29 executing program 3: socket(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:29 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x3a}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 838.870971] EXT4-fs (loop5): Unsupported filesystem blocksize 0 (1923657432 log_block_size) [ 838.908344] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 19:16:29 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:29 executing program 0: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r1, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:29 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x3a}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 839.061882] EXT4-fs (loop5): Unsupported filesystem blocksize 0 (1923657432 log_block_size) [ 839.096833] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 19:16:29 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r5 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r6 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r7 = dup2(0xffffffffffffffff, r6) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r8 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r7, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(r1, r8, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:29 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x3a}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:29 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:29 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 839.270424] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 839.311764] EXT4-fs (loop5): journaled quota format not specified [ 839.355593] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" [ 839.386875] EXT4-fs (loop5): journaled quota format not specified 19:16:29 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:29 executing program 0: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r1, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:29 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x3a, 0x400}], 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:29 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r5 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r6 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r7 = dup2(0xffffffffffffffff, r6) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r8 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r7, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(r1, r8, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:29 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 839.579373] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (1923657432 log_block_size) [ 839.594667] EXT4-fs (loop5): journaled quota format not specified 19:16:29 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 839.620547] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" 19:16:29 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x3a, 0x400}], 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 839.662229] EXT4-fs (loop5): journaled quota format not specified 19:16:30 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 839.757131] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (1923657432 log_block_size) 19:16:30 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r5 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r6 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r7 = dup2(0xffffffffffffffff, r6) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r8 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r7, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(r1, r8, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:30 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x3a, 0x400}], 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 839.856770] EXT4-fs (loop5): journaled quota format not specified 19:16:30 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r1, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:30 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 839.912651] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" [ 839.952492] EXT4-fs (loop5): journaled quota format not specified [ 839.981223] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (1923657432 log_block_size) 19:16:30 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x0, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:30 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r5 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r6 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r7 = dup2(0xffffffffffffffff, r6) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r8 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r7, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(r1, r8, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:30 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 19:16:30 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:30 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r1, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 840.235025] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (1923657432 log_block_size) [ 840.241220] EXT4-fs (loop5): journaled quota format not specified [ 840.263356] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" 19:16:30 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:30 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 840.305980] EXT4-fs (loop5): journaled quota format not specified 19:16:30 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 19:16:30 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r5 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r6 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r7 = dup2(0xffffffffffffffff, r6) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r8 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r7, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(r1, r8, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 840.415812] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (1923657432 log_block_size) 19:16:30 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 840.532646] EXT4-fs (loop5): journaled quota format not specified [ 840.565640] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" [ 840.612440] EXT4-fs (loop5): journaled quota format not specified [ 840.620639] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (1923657432 log_block_size) 19:16:30 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:30 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 840.826431] EXT4-fs (loop4): journaled quota format not specified [ 840.853422] EXT4-fs (loop5): journaled quota format not specified [ 840.861047] EXT4-fs (loop4): failed to parse options in superblock: usrjquota=" 19:16:31 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r1, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:31 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r5 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r6 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r7 = dup2(0xffffffffffffffff, r6) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r8 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r7, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(r1, r8, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:31 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x0, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:31 executing program 3: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r1, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 840.876977] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" [ 840.884808] EXT4-fs (loop4): journaled quota format not specified [ 840.886440] EXT4-fs (loop5): journaled quota format not specified 19:16:31 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:31 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 841.054375] EXT4-fs (loop4): journaled quota format not specified [ 841.077047] EXT4-fs (loop4): failed to parse options in superblock: usrjquota=" [ 841.089426] EXT4-fs (loop5): journaled quota format not specified [ 841.117167] EXT4-fs (loop4): journaled quota format not specified [ 841.127501] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" 19:16:31 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r1, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 841.168163] EXT4-fs (loop5): journaled quota format not specified 19:16:31 executing program 3: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r1, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:31 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:31 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, r2) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r4 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r5 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r6 = dup2(0xffffffffffffffff, r5) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r7 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r6, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(r1, r7, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:31 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 841.362582] EXT4-fs (loop4): journaled quota format not specified [ 841.377087] EXT4-fs (loop5): journaled quota format not specified [ 841.391844] EXT4-fs (loop4): failed to parse options in superblock: usrjquota=" [ 841.401799] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" 19:16:31 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 841.417503] EXT4-fs (loop4): journaled quota format not specified [ 841.424270] EXT4-fs (loop5): journaled quota format not specified 19:16:31 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 19:16:31 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, r2) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r4 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r5 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r6 = dup2(0xffffffffffffffff, r5) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r7 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r6, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(r1, r7, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 841.590755] EXT4-fs (loop5): journaled quota format not specified [ 841.635765] EXT4-fs (loop4): journaled quota format not specified [ 841.637885] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" [ 841.669842] EXT4-fs (loop4): failed to parse options in superblock: usrjquota=" 19:16:31 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x0, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:31 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r1, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:31 executing program 3: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r1, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 841.696779] EXT4-fs (loop4): journaled quota format not specified [ 841.732594] EXT4-fs (loop5): journaled quota format not specified 19:16:32 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 19:16:32 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 841.874472] EXT4-fs (loop4): journaled quota format not specified 19:16:32 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, 0x0, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 841.919195] EXT4-fs (loop4): failed to parse options in superblock: usrjquota=" [ 841.927239] EXT4-fs (loop5): journaled quota format not specified [ 841.957118] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" [ 841.962647] EXT4-fs (loop4): journaled quota format not specified 19:16:32 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, r2) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r4 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r5 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r6 = dup2(0xffffffffffffffff, r5) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r7 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r6, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(r1, r7, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:32 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r1, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 841.991649] EXT4-fs (loop5): journaled quota format not specified 19:16:32 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 19:16:32 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 19:16:32 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r1, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 842.175866] EXT4-fs (loop4): journaled quota format not specified [ 842.188396] EXT4-fs (loop5): journaled quota format not specified [ 842.210141] EXT4-fs (loop4): failed to parse options in superblock: usrjquota=" [ 842.237386] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" [ 842.243968] EXT4-fs (loop4): journaled quota format not specified [ 842.279879] EXT4-fs (loop5): journaled quota format not specified 19:16:32 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 19:16:32 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:32 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 19:16:32 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r1, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 842.464122] EXT4-fs (loop4): journaled quota format not specified [ 842.502515] EXT4-fs (loop4): failed to parse options in superblock: usrjquota=" 19:16:32 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, 0x0) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r4 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r5 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r6 = dup2(0xffffffffffffffff, r5) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r7 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r6, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(r1, r7, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 842.542906] EXT4-fs (loop4): journaled quota format not specified [ 842.565600] EXT4-fs (loop5): journaled quota format not specified [ 842.583093] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" 19:16:32 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 842.625237] EXT4-fs (loop5): journaled quota format not specified 19:16:32 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, 0x0, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:32 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) 19:16:32 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 842.724690] EXT4-fs (loop4): journaled quota format not specified [ 842.757929] EXT4-fs (loop4): failed to parse options in superblock: usrjquota=" [ 842.799676] EXT4-fs (loop4): journaled quota format not specified [ 842.814884] EXT4-fs (loop5): journaled quota format not specified 19:16:33 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r1, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 842.840119] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" [ 842.870192] EXT4-fs (loop5): journaled quota format not specified 19:16:33 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 19:16:33 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) 19:16:33 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, 0x0) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r4 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r5 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r6 = dup2(0xffffffffffffffff, r5) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r7 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r6, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(r1, r7, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 843.008413] EXT4-fs (loop4): journaled quota format not specified [ 843.031736] EXT4-fs (loop4): failed to parse options in superblock: usrjquota=" [ 843.046269] EXT4-fs (loop5): journaled quota format not specified [ 843.063024] EXT4-fs (loop4): journaled quota format not specified [ 843.072530] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" [ 843.099714] EXT4-fs (loop5): journaled quota format not specified 19:16:33 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 19:16:33 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:33 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) [ 843.245628] EXT4-fs (loop4): journaled quota format not specified [ 843.268662] EXT4-fs (loop5): journaled quota format not specified [ 843.269965] EXT4-fs (loop4): failed to parse options in superblock: usrjquota=" 19:16:33 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r1, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 843.307549] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" [ 843.339560] EXT4-fs (loop5): journaled quota format not specified [ 843.348097] EXT4-fs (loop4): journaled quota format not specified 19:16:33 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, 0x0) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r4 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r5 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r6 = dup2(0xffffffffffffffff, r5) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r7 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r6, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(r1, r7, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:33 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, 0x0, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:33 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="7573726a7162c428cff4f59f44fd98402d610722785e993d2200"]) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/member\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) fsetxattr(r0, &(0x7f0000000000)=@known='user.syz\x00', &(0x7f0000000040)='ppp1\x00', 0x5, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:16:33 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 19:16:33 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:33 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 843.593845] EXT4-fs (loop4): journaled quota format not specified [ 843.614432] EXT4-fs (loop4): failed to parse options in superblock: usrjquota=" [ 843.635827] EXT4-fs (loop5): Unrecognized mount option "usrjqbÄ(ĻōõŸDż˜@-a"x^™="" or missing value [ 843.658242] EXT4-fs (loop4): journaled quota format not specified 19:16:33 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r1, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:34 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:34 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 843.752193] EXT4-fs (loop5): Unrecognized mount option "usrjqbÄ(ĻōõŸDż˜@-a"x^™="" or missing value 19:16:34 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r5 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r6 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r7 = dup2(0xffffffffffffffff, r6) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r8 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r7, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(r1, r8, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:34 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pread64(r3, &(0x7f0000000000)=""/117, 0x75, 0x80000000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:34 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:34 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, 0x0, 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 843.939493] EXT4-fs (loop4): journaled quota format not specified [ 843.976089] EXT4-fs (loop4): failed to parse options in superblock: usrjquota=" 19:16:34 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 843.999260] EXT4-fs (loop5): journaled quota format not specified [ 844.052668] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" [ 844.062564] EXT4-fs (loop4): journaled quota format not specified 19:16:34 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r1, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 844.106013] EXT4-fs (loop5): journaled quota format not specified 19:16:34 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) 19:16:34 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 844.207486] EXT4-fs (loop5): journaled quota format not specified [ 844.230372] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" [ 844.247453] EXT4-fs (loop4): journaled quota format not specified 19:16:34 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, 0x0, 0x0) [ 844.271844] EXT4-fs (loop4): failed to parse options in superblock: usrjquota=" [ 844.285594] EXT4-fs (loop5): journaled quota format not specified [ 844.314294] EXT4-fs (loop4): journaled quota format not specified 19:16:34 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r5 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r6 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r7 = dup2(0xffffffffffffffff, r6) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r8 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r7, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(r1, r8, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:34 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, 0x0, 0x0) 19:16:34 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TIOCGSERIAL(r5, 0x541e, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=""/26}) ioctl$UI_SET_FFBIT(r3, 0x4004556b, 0x1a) 19:16:34 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:34 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, 0x0, 0x0) 19:16:34 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) [ 844.545630] EXT4-fs (loop5): journaled quota format not specified [ 844.584857] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" [ 844.616837] EXT4-fs (loop4): journaled quota format not specified [ 844.639006] EXT4-fs (loop4): failed to parse options in superblock: usrjquota=" [ 844.644860] EXT4-fs (loop5): journaled quota format not specified [ 844.664138] EXT4-fs (loop4): journaled quota format not specified 19:16:35 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, 0x0, 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:35 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}], 0x9) 19:16:35 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 844.773513] EXT4-fs (loop5): journaled quota format not specified [ 844.779829] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" 19:16:35 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) 19:16:35 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r5 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r6 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r7 = dup2(0xffffffffffffffff, r6) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r8 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r7, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(r1, r8, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 844.814279] EXT4-fs (loop5): journaled quota format not specified 19:16:35 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$fou(&(0x7f0000000000)='fou\x00') 19:16:35 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}], 0x9) [ 844.922872] EXT4-fs (loop4): journaled quota format not specified [ 844.940906] EXT4-fs (loop4): failed to parse options in superblock: usrjquota=" [ 844.978327] EXT4-fs (loop4): journaled quota format not specified 19:16:35 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}], 0x9) [ 845.026041] EXT4-fs (loop5): journaled quota format not specified [ 845.058768] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" 19:16:35 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r5 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r6 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r7 = dup2(0xffffffffffffffff, r6) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r8 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r7, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(r1, r8, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:35 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {0x0}], 0xa) [ 845.110229] EXT4-fs (loop5): journaled quota format not specified 19:16:35 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:35 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='\x00'/12]) r0 = syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x3) dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 845.223233] EXT4-fs (loop5): journaled quota format not specified [ 845.237120] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" [ 845.275441] EXT4-fs (loop5): journaled quota format not specified [ 845.301115] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (1923657432 log_block_size) [ 845.476298] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (1923657432 log_block_size) 19:16:35 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:35 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {0x0}], 0xa) 19:16:35 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r5 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r6 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r7 = dup2(0xffffffffffffffff, r6) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r8 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r7, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(r1, r8, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:35 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:35 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, 0x0, 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:35 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usjquo\xf8a\xbd\x00', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) keyctl$join(0x1, 0x0) 19:16:35 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:35 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {0x0}], 0xa) 19:16:35 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 845.633114] EXT4-fs (loop5): journaled quota format not specified 19:16:35 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 845.689586] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" [ 845.704346] EXT4-fs (loop4): Unrecognized mount option "usjquoųa½" or missing value [ 845.726979] EXT4-fs (loop5): journaled quota format not specified 19:16:36 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001800)=""/254, 0xfe}], 0x9) 19:16:36 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r5 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r6 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r7 = dup2(0xffffffffffffffff, r6) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r8 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r7, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(r1, r8, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 845.801084] EXT4-fs (loop4): Unrecognized mount option "usjquoųa½" or missing value [ 845.817021] EXT4-fs (loop5): journaled quota format not specified [ 845.857591] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" [ 845.933627] EXT4-fs (loop5): journaled quota format not specified 19:16:36 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x10000, 0x0) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:16:36 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001800)=""/254, 0xfe}], 0x9) 19:16:36 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:36 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCGETA(r1, 0x5405, &(0x7f0000000000)) syz_mount_image$ext4(&(0x7f00000001c0), &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000280)={[{@norecovery='norecovery', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKRESETZONE(r4, 0x40101283, &(0x7f0000000040)={0x0, 0xedd}) r5 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) [ 846.183592] EXT4-fs (loop5): journaled quota format not specified [ 846.213892] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" [ 846.232039] EXT4-fs (loop5): journaled quota format not specified 19:16:36 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:36 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="46c76ec5d551619e75656261636b2200"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:36 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:36 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r5 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r6 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r7 = dup2(0xffffffffffffffff, r6) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r8 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r7, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(r1, r8, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:36 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001800)=""/254, 0xfe}], 0x9) 19:16:36 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="7573726a71756f740dde13f0075b78613d2204905c965c763482a4cf83177c0ce6da29cae6021980fc6b54f6949405500f8f5d5546f39af892caa77c249a956ed8273ac66ab3f330bc5092e703132a7bd98d7e38716afae5031df0f2bff9c5cfa7fa9fd1e6126e1d8df0833db25c39dae72747c1c08881e2a7cd210f2cb3a225aaa2973a789780fe520a0786e83dfb679c56ccf25b88d489eacd7aafe1822b028f1595e549776e32245ac68678f3cd6730c470518fb772b79925393b03ac7e6ddf8bf072"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 846.284525] EXT4-fs (loop5): journaled quota format not specified [ 846.301379] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" [ 846.308963] EXT4-fs (loop5): journaled quota format not specified 19:16:36 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {0x0}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:36 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, 0x0, 0x0) [ 846.396687] EXT4-fs (loop4): Unrecognized mount option "FĒnÅÕQažueback"" or missing value 19:16:36 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {0x0}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 846.473799] EXT4-fs (loop4): Unrecognized mount option "FĒnÅÕQažueback"" or missing value [ 846.497860] EXT4-fs (loop5): Unrecognized mount option "usrjquot Žš[xa="\–\v4‚¤Ļƒ| ęŚ)Źę€ükTö””P]UFóšų’Ź§|$š•nŲ':Ęj³ó0¼P’ē*{Ł~8qjśåšņæłÅĻ§śŸŃęnšƒ=²\9Śē'GĮĄˆā§Ķ!" or missing value 19:16:36 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, 0x0, 0x0) 19:16:36 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="7573726a71756f74613d2200b37dfd1d34c674be085f19840fd18cd1b48cc8a37b6c4afcf46c43fcaf9a4abff36c4cbd58f56edb54a5278b298489e5e4bcc77b7ad1f9f5b5a8adfaf7085e0060e3a24fc3ef57559ad7d1a95fe43533292c3fac81b117ae93f9da9489040f9b28fadf618e9f9701c104e8799d8836526139bc2d36ed9ae8aab101405b61b3ed809b050c7f51a94f72f1d9121b42a7d114b228e90dcc4a109088e6007221e3c2b2d785a6058dd016b18048b7cf8a3ace"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) quotactl(0x6, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000200)="c8f89ecbb69257b8862cc7cc8b7da81ceb2d7c1a4d1d587aac00de74212e56957f5d1b98d68007fba616ffd114bce098074ee64f8c19f8e7a70f8fbea1cc6366016e6e005551b59c9625c5a8d10981e1fda7b05d6aa8f2c23eca1e282c0dc493241350e41f027fe58a52bad5937a460f7616890fb94dc76564630d7e4225f7") r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:36 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {0x0}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 846.659458] EXT4-fs (loop5): Unrecognized mount option "usrjquot Žš[xa="\–\v4‚¤Ļƒ| ęŚ)Źę€ükTö””P]UFóšų’Ź§|$š•nŲ':Ęj³ó0¼P’ē*{Ł~8qjśåšņæłÅĻ§śŸŃęnšƒ=²\9Śē'GĮĄˆā§Ķ!" or missing value [ 846.672432] EXT4-fs (loop4): journaled quota format not specified 19:16:37 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, 0x0, 0x0) 19:16:37 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r5 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r6 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r7 = dup2(0xffffffffffffffff, r6) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r8 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r7, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(r1, r8, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:37 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:37 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0x9) 19:16:37 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xc00, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0xfffffd56, 0x400}], 0x0, &(0x7f0000000000)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0\x00', 0x4200, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f0000001f00)={0x0, 0x0}) recvmmsg(r2, &(0x7f0000001e40)=[{{&(0x7f00000002c0)=@can={0x1d, 0x0}, 0x80, &(0x7f0000001480)=[{&(0x7f0000000340)=""/245, 0xf5}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/24, 0x18}], 0x3, &(0x7f00000014c0)=""/129, 0x81}, 0x8}, {{&(0x7f0000001580)=@in={0x2, 0x0, @remote}, 0x3b, &(0x7f0000001ac0)=[{&(0x7f0000001600)=""/75, 0x4b}, {&(0x7f0000001680)=""/127, 0x7f}, {&(0x7f0000001700)=""/109, 0x6d}, {&(0x7f0000001780)=""/32, 0x20}, {&(0x7f00000017c0)=""/51, 0x33}, {&(0x7f0000001800)=""/154, 0x9a}, {&(0x7f0000000200)=""/81, 0x51}, {&(0x7f0000001940)=""/57, 0x39}, {&(0x7f0000001980)=""/190, 0xbe}, {&(0x7f0000001a40)=""/111, 0x6f}], 0xa, &(0x7f0000001b80)=""/104, 0x68}, 0x3}, {{&(0x7f0000001c00)=@ethernet={0x0, @broadcast}, 0x80, &(0x7f0000001d00)=[{&(0x7f0000001c80)=""/113, 0x71}], 0x1, &(0x7f0000001d40)=""/193, 0xc1}, 0x818}], 0x3, 0x40, &(0x7f0000001f40)={r3, r4+30000000}) sendmsg$nl_route_sched(r0, &(0x7f0000002040)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x29008000}, 0xc, &(0x7f0000002000)={&(0x7f0000001f80)=@newtclass={0x58, 0x28, 0xf08, 0x70bd2a, 0x25dfdbff, {0x0, 0x0, 0x0, r5, {0x5, 0x6e6f76825608af0d}, {0xfffb, 0x5}, {0x4, 0x6}}, [@tclass_kind_options=@c_drr={{0x8, 0x1, 'drr\x00'}, {0xc, 0x2, @TCA_DRR_QUANTUM={0x8, 0x1, 0x8}}}, @TCA_RATE={0x8, 0x5, {0x8b, 0x91}}, @tclass_kind_options=@c_skbprio={0xc, 0x1, 'skbprio\x00'}, @TCA_RATE={0x8, 0x5, {0x1f}}]}, 0x58}, 0x1, 0x0, 0x0, 0xf13dcfc05525dc22}, 0x4000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) 19:16:37 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}], 0x9) 19:16:37 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0x9) [ 846.821499] EXT4-fs (loop4): journaled quota format not specified 19:16:37 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fdatasync(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 19:16:37 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0x9) 19:16:37 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}], 0x9) 19:16:37 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r5 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r6 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r7 = dup2(0xffffffffffffffff, r6) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r8 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r7, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(r1, r8, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 847.058583] EXT4-fs (loop4): journaled quota format not specified 19:16:37 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {0x0}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:37 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}], 0x9) [ 847.107711] EXT4-fs (loop4): failed to parse options in superblock: usrjquota=" [ 847.147895] EXT4-fs (loop4): journaled quota format not specified 19:16:37 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {0x0}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 847.268019] EXT4-fs (loop4): journaled quota format not specified [ 847.283225] EXT4-fs (loop4): failed to parse options in superblock: usrjquota=" [ 847.320407] EXT4-fs (loop4): journaled quota format not specified 19:16:37 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:37 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {0x0}], 0xa) 19:16:37 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(0xffffffffffffffff, 0x43169cf51b9805ea, r0) write$P9_RLCREATE(r2, &(0x7f0000000040)={0x18, 0xf, 0x1, {{0x2, 0x0, 0x2}, 0x4}}, 0x18) r3 = dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$EVIOCGKEYCODE_V2(r5, 0x80284504, &(0x7f0000000000)=""/43) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 19:16:37 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="7073e3e0b00300000200000004000000000000ff000000"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000140)={'veth1_to_bond\x00', {0x2, 0x4e20, @multicast2}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:16:37 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {0x0}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:37 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r2 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r2) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r4 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r5 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r6 = dup2(0xffffffffffffffff, r5) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r7 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r6, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(r1, r7, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:37 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {0x0}], 0xa) 19:16:37 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {0x0}], 0xa) [ 847.598328] EXT4-fs (loop5): journaled quota format not specified [ 847.620626] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" [ 847.621137] EXT4-fs (loop4): Unrecognized mount option "psćą°" or missing value 19:16:37 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0x9) 19:16:37 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001800)=""/254, 0xfe}], 0x9) [ 847.662814] EXT4-fs (loop5): journaled quota format not specified 19:16:38 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0x9) [ 847.738184] EXT4-fs (loop5): journaled quota format not specified [ 847.764521] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" [ 847.767382] EXT4-fs (loop4): Unrecognized mount option "psćą°" or missing value 19:16:38 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001800)=""/254, 0xfe}], 0x9) [ 847.815008] EXT4-fs (loop5): journaled quota format not specified 19:16:38 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r2 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r2) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r4 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r5 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r6 = dup2(0xffffffffffffffff, r5) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r7 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r6, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(r1, r7, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:38 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0x9) 19:16:38 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x101400, 0x0) r1 = dup(r0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000040)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x5641) 19:16:38 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:38 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) fcntl$setsig(r0, 0xa, 0xd) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:16:38 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001800)=""/254, 0xfe}], 0x9) 19:16:38 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {0x0}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:38 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {0x0}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:38 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="758719324ffa3dc2c8f89c43921d5c42ba1d8ddfb7cb3900000000000000fbee2001f7dc9a0c77e174"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCSABS3F(r1, 0x401845ff, &(0x7f0000000040)={0x63e4ccb1, 0xffffffff, 0x7, 0x6, 0x6, 0x1}) r2 = openat$cgroup(r1, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) r3 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self\x00', 0x2000, 0x0) fcntl$dupfd(r2, 0x0, r3) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) [ 848.120064] EXT4-fs (loop4): journaled quota format not specified [ 848.156476] EXT4-fs (loop4): failed to parse options in superblock: usrjquota=" 19:16:38 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r2 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r2) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r4 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r5 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r6 = dup2(0xffffffffffffffff, r5) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r7 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r6, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(r1, r7, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:38 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:38 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {0x0}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:38 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {0x0}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 848.178786] EXT4-fs (loop4): journaled quota format not specified [ 848.203323] EXT4-fs (loop5): Unrecognized mount option "u‡2Oś=ĀČųœC’\Bŗß·Ė9" or missing value 19:16:38 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {0x0}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:38 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="000000000000000000a7000000"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x2) io_cancel(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x9, r2, &(0x7f0000000200)="264af09c8f313ac358d146c1f2ed14d442142cab7badc907e122b990598700d3bb34b9cf984240359a34a4e9cf4c41654a5e392ce2fa7890d4e954eff75cc8147f43a3bac9483328a4cb259fdd58b0bae970a301553535d04578771cdd33c828d96296d3949d414db665d72e9af379aeee50c8b4ebe31ff7622e8b07521e2ef509016f4a80b720f708f3e327ae52b39028737693c4d32c523da01dcba57daa56a06e0189595c54ab9d3e7d272f1673968be74e2cd60ce96c60349d90a570e4e0a5508d95374d234f8945b23bf526b687783a81b48c7c750323a31517a6", 0xdd, 0x4, 0x0, 0x3, r1}, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 848.292475] EXT4-fs (loop4): journaled quota format not specified [ 848.303292] EXT4-fs (loop5): Unrecognized mount option "u‡2Oś=ĀČųœC’\Bŗß·Ė9" or missing value [ 848.305884] EXT4-fs (loop4): failed to parse options in superblock: usrjquota=" 19:16:38 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {0x0}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 848.396097] EXT4-fs (loop4): journaled quota format not specified 19:16:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='ussjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGBITSND(r3, 0x80404532, &(0x7f0000000100)=""/80) 19:16:38 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0x9) 19:16:38 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0x9) 19:16:38 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r2 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r2) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r4 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r5 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r6 = dup2(0xffffffffffffffff, r5) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r7 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r6, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(r1, r7, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 848.507588] EXT4-fs (loop5): Unsupported filesystem blocksize 0 (1923657432 log_block_size) 19:16:38 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0x9) 19:16:38 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0x9) [ 848.591234] EXT4-fs (loop5): Unrecognized mount option " oJ€· ÷óć'®R³(sv“ÄÓ" or missing value [ 848.658904] EXT4-fs (loop4): Unrecognized mount option "ussjquota="" or missing value [ 848.660299] EXT4-fs (loop5): failed to parse options in superblock: oJ€· ÷óć'®R³(sv“ÄÓ 19:16:39 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:39 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0x9) 19:16:39 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0x9) [ 848.724979] EXT4-fs (loop5): Unsupported filesystem blocksize 0 (1923657432 log_block_size) [ 848.757991] EXT4-fs (loop4): Unrecognized mount option "ussjquota="" or missing value 19:16:39 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="ed8b726a71756f74613d2200"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:39 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="7573253e23f06f20bf3d2200"]) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x140, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:16:39 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {0x0}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:39 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {0x0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:39 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r2 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r2) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r4 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r5 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r6 = dup2(0xffffffffffffffff, r5) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r7 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r6, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(r1, r7, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:39 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {0x0}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 848.937819] EXT4-fs (loop4): Unrecognized mount option "us%>#šo æ="" or missing value [ 848.955938] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 848.966353] EXT4-fs (loop4): failed to parse options in superblock: us%>#šo æ=" 19:16:39 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {0x0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 849.016536] EXT4-fs (loop4): Unrecognized mount option "us%>#šo æ="" or missing value [ 849.054613] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 19:16:39 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f0000000140)='y\x00', 0x2, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:39 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {0x0}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 849.102695] EXT4-fs (loop4): Unrecognized mount option "us%>#šo æ="" or missing value [ 849.128417] EXT4-fs (loop4): failed to parse options in superblock: us%>#šo æ=" 19:16:39 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r4, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r4, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r5 = socket(0x9, 0xfffffffffffffffd, 0x8) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r7 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r8 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r9 = dup2(0xffffffffffffffff, r8) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r10 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r9, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r5, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r10, 0x80003) sendfile(r1, r10, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:39 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {0x0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:39 executing program 4: ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000000)=0x2) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x3a, 0x400}], 0x12, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 849.162580] EXT4-fs (loop4): Unrecognized mount option "us%>#šo æ="" or missing value [ 849.196127] EXT4-fs (loop5): journaled quota format not specified 19:16:39 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r2 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r2) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r4 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r5 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r6 = dup2(0xffffffffffffffff, r5) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r7 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r6, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(r1, r7, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:39 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0x9) [ 849.228396] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" 19:16:39 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0x9) [ 849.299988] EXT4-fs (loop5): journaled quota format not specified 19:16:39 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0x9) [ 849.349998] EXT4-fs (loop4): journaled quota format not specified 19:16:39 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0x9) 19:16:39 executing program 5: ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000000)={0x2, 0xc4c5, 0x80000000, 0x0, 0x1}) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:39 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0x9) 19:16:39 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0x9) 19:16:39 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) epoll_wait(r1, &(0x7f0000000140)=[{}, {}, {}, {}], 0x4, 0xfffffff9) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000280)=ANY=[]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) setsockopt$inet6_opts(r2, 0x29, 0x2e, &(0x7f0000000200)=@routing={0x87, 0x8, 0x0, 0x65, 0x0, [@mcast2, @local, @mcast2, @local]}, 0x48) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/user\x00', 0x2, 0x0) [ 849.590847] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 19:16:39 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r4, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r4, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r5 = socket(0x9, 0xfffffffffffffffd, 0x8) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r7 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r8 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r9 = dup2(0xffffffffffffffff, r8) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r10 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r9, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r5, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r10, 0x80003) sendfile(r1, r10, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:39 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r2 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r2) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r4 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r5 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r6 = dup2(0xffffffffffffffff, r5) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r7 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r6, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(r1, r7, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:39 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {0x0}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:39 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {0x0}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:39 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFNETMASK(r2, 0x891c, &(0x7f0000000140)={'teql0\x00', {0x2, 0x4e22, @local}}) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891b, &(0x7f0000000280)={'ip_vti0\x00', {0x2, 0x4e24, @rand_addr=0x1}}) setxattr$security_selinux(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000640)='system_u:object_r:dpkg_var_lib_t:s0\x00', 0x24, 0x1) ioctl$BINDER_SET_CONTEXT_MGR(r3, 0x40046207, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x323, &(0x7f0000000200)=[{&(0x7f00000002c0)="c99d259e5d00666b3123c3bd243c3ca36b93650c57dc2f6bbe6092a2866716ad460fa273726c3e2ba1bc50c834f9174407acd2d77946f941b06086ed03c2e243716f7a1779a6544c14de83f62e41a22f1014e5826fc72f9b0b962154ee411affe529d95ad8c8bc47fbca1c30e53e495ff10c432f338c49b026faf34c332b1ce304518e4c2e"}, {&(0x7f0000000380)="3bf1b2699da63d0f755635d162a12e48297f98167d84594653f90b6a9242840c6759557530617993fb5b44fbd1a1bec4ba6259a5f052696d89b116fd62c246f77e54ee8b192061e3753c7f074cb26dc05382f62aa1cd92a174038f103b3a94ef2413a3efd027bb2ebab9dcd68a2ff0e0d6ccafb6214b4f8c4c7e3254853ab42c181cdfeaa1ccc092d6ae55bbf9d7aea043349fd1f79ab72b86d1396d2eab135aa65f1fa02a3751c626fd679e1850159b614b55e425777755249c99afb1e9e04a586d7f82ee97aa2ded3cdf33620a590317ad0263aea58bf254a8d5eb992b59a21290a4459864cf", 0x0, 0x20}, {&(0x7f0000000480)="5b416c020623e94c30651ff15531033aa8e08ff9edb435725e7ef3792ea0a74487d2120a7eda1f1f911b2727b05805d263d508078393397ba965b61b1d2c844deba45940e1cdc92255e7e49644afce7994df52c432567bab7149478069e6d16041f0b142aa4dc8423058c49887186d122a14d2b2b3a3f3ae8694a6350516672aebc8fd4375760e422fa15ed219a1204b58580371c607d42ce7162724023a78d3807091167c380097c77fc2dc", 0x0, 0x8}], 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0700c04aa0ab75b212e09b6ad453bc8d570100e505bf00613d22d82860da75c2402eec61707072616973655f7479218e3d696d617369672c53b3d345c4576d61636b6673666c6f6f723d2c050000005f686173682c736d61636b6673666c6f6f723d7573726271756f74613d2c66736d616769633d3078b03030303030303030303030616435362c0062645f0107340701420d3b3b608f839383d9091d982d974d98dd94528fb7d7910efe4a7e144e9ea3c7ee39d3a20eb1994006aa095b12f2fd21af03e8ea22bcba6b4873812f3c71c22895d2c0db696fdf69"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000000)={0x4, 0x70, 0xbf, 0x6, 0x85, 0x7, 0x0, 0x1f, 0x4, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x6, 0x6, @perf_config_ext={0x0, 0x400}, 0x4, 0x6, 0x401, 0x8, 0x4, 0x1, 0xff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) [ 849.693198] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (1923657432 log_block_size) 19:16:40 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {0x0}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:40 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {0x0}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 849.804277] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 849.815841] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (1923657432 log_block_size) 19:16:40 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {0x0}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:40 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {0x0}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:40 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_GET_KEEPCAPS(0x7) personality(0x400000a) 19:16:40 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r2 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r2) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r4 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r5 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r6 = dup2(0xffffffffffffffff, r5) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r7 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r6, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(r1, r7, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:40 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0x9) [ 850.108532] EXT4-fs (loop5): journaled quota format not specified [ 850.157597] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" [ 850.190965] EXT4-fs (loop5): journaled quota format not specified [ 850.257496] EXT4-fs (loop5): journaled quota format not specified [ 850.272468] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" [ 850.310479] EXT4-fs (loop5): journaled quota format not specified 19:16:40 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r4, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r4, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r5 = socket(0x9, 0xfffffffffffffffd, 0x8) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r7 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r8 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r9 = dup2(0xffffffffffffffff, r8) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r10 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r9, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r5, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r10, 0x80003) sendfile(r1, r10, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:40 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0x9) 19:16:40 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:40 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x1, 0x3, &(0x7f0000000480)=[{&(0x7f00000002c0)="b268031a1525a5cce8512dd44a09646c01cbe111f9d013a0bf6e21376b60f5d2b284e9f1a6373f02df2570529433a1c9f0fe74475d9075434adb094064f40349e81f2ab2f425f05bb551a4e14e3e516a73de022d4568a628a1263ef14ae382678cb089778a70217ebbb568ce165c183e7bacbc019dfdcd0ceece80997aa1a9e97ab55cdb2273ec7d2d8b93fd1fd6191f0de15ff973ff27b289", 0x99, 0x6}, {&(0x7f0000000200)="0a2a9d03f7947e1cd78d8d400d596abfca29a593f486d043ca778df6c566cd5c1989d78af41bd89e89aec97ffba27d210615ad38a12476feb0f77afe67d38543de5315a59c1e20aa57779092cf3161f76484e7ae351b53339e761b1efe23b7", 0x5f, 0x2}, {&(0x7f0000000380)="62f5c070bd0ba614850d989128dd2f565fc8120a3ee58b951c1a3c6b26d7fe726d4e04b157998b5c6a16af22245580ab17457778560b7bafc6effbc1e959069b1c590aef2f50752e61d61127f4b8ff9398ed15fc24043deb04473a0600170765cc6e834092206d2c0f70fb2ec69502234a396e1d40f167809ddc0dc3cd84f12b82ba80a70825203bf79c42ca3552c441127ef59ed63700ed089f06a577c554b01ea7e7ddd01a8aedcda6a158b12a3fca7979e255356db5f801ae3690b44fcae2e433a49fd0855d0565db8d81c1fc84bb", 0xd0}], 0x10000, &(0x7f0000000500)={[{@fat=@fmask={'fmask', 0x3d, 0xf4ad}}, {@dots='dots'}, {@fat=@nfs='nfs'}, {@nodots='nodots'}, {@nodots='nodots'}], [{@obj_role={'obj_role', 0x3d, 'usrjquota='}}, {@measure='measure'}, {@permit_directio='permit_directio'}, {@euid_gt={'euid>', r0}}, {@audit='audit'}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@context={'context', 0x3d, 'staff_u'}}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:16:40 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0x9) 19:16:40 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0xd2953dbeeb8074e3, 0x0) r1 = syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80400}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x3c, r1, 0x200, 0x70bd28, 0x25dfdbfd, {}, [{{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x80}, 0xfa44bb498b67d844) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x840d0422}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)={0x84, r1, 0x800, 0x70bd27, 0x25dfdbfd, {}, [{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_FD={0x8}}, {@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8b, 0x1}}]}, 0x84}, 0x1, 0x0, 0x0, 0x20064011}, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(r0, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xdd003a7f156ec2bd}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)={0x6c, r1, 0x800, 0x70bd2b, 0x25dfdbff, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x8}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x8, 0x4, 0x1}}]}, 0x6c}, 0x1, 0x0, 0x0, 0x1}, 0x440f0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 19:16:40 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0x9) 19:16:40 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0x9) 19:16:40 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {0x0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:40 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0x9) [ 850.512338] EXT4-fs (loop5): journaled quota format not specified [ 850.548244] EXT4-fs (loop4): journaled quota format not specified [ 850.554932] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" 19:16:40 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 850.592883] EXT4-fs (loop4): failed to parse options in superblock: usrjquota=" [ 850.619666] EXT4-fs (loop5): journaled quota format not specified 19:16:40 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {0x0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 850.643561] EXT4-fs (loop4): journaled quota format not specified [ 850.719466] EXT4-fs (loop5): journaled quota format not specified [ 850.752122] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" [ 850.787822] EXT4-fs (loop5): journaled quota format not specified 19:16:41 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, 0x0, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:41 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000200)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0xfffffffffffffe06, 0x400}], 0x4000, &(0x7f0000000280)=ANY=[@ANYBLOB="7573729a88756f74613d2200"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$set_timeout(0xf, r2, 0x0) keyctl$set_timeout(0xf, r2, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xffffffffffffffff) 19:16:41 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {0x0}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:41 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {0x0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:41 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:41 executing program 5: r0 = syz_open_dev$rtc(&(0x7f0000000140)='/dev/rtc#\x00', 0x0, 0x0) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x4) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/member\x00', 0x2, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="6d61785f62617463685f74696d653d30783030013030300430303030306266353622007341c00b7066ffbb01b782008f7caf55b93324e0c599a8e5c07e163ac8143e15410adda460803f43d06f0ea15706121b18f9e81a068bdca477fd8062fec1f4e5206ccd41252a5fdf6fd424084a8dda820a2a15676ecd968ae86d1a2484e0bc6c7d"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) munlockall() ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:16:41 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {0x0}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:41 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0x9) [ 851.008216] EXT4-fs (loop5): Unrecognized mount option "max_batch_time=0x0000000000bf56"" or missing value 19:16:41 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {0x0}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:41 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0x9) 19:16:41 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCSETS(r3, 0x5402, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x184c, 0x6, 0x6, 0xfd, 0x5, 0x3, 0xb7, 0x422, 0xffff15be}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_pts(r1, 0x2) 19:16:41 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0x9) [ 851.191219] EXT4-fs (loop5): journaled quota format not specified [ 851.240477] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" [ 851.275048] EXT4-fs (loop5): journaled quota format not specified [ 851.358465] EXT4-fs (loop5): journaled quota format not specified [ 851.370894] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" [ 851.377210] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 851.386231] EXT4-fs (loop5): journaled quota format not specified 19:16:41 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, 0x0, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 851.557610] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 19:16:41 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0x9) 19:16:41 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:41 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0x9) 19:16:41 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="7573726a7168412db68c5d39"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$unix(r1, &(0x7f0000000000)=@abs={0x1, 0x0, 0x4e24}, 0x6e) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat(r1, &(0x7f0000000240)='./file0\x00', 0x18000, 0x40) dup2(r5, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$EVIOCGABS2F(r10, 0x8018456f, &(0x7f0000000140)=""/40) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r11 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) 19:16:41 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x18a, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x3ff}], 0x160080, &(0x7f0000001100)=ANY=[@ANYBLOB="7504726a71756f74613da2002af36417fe66329465526af6cf129a2c04702e54e1d26a24c58cbc06cbdff144de8415bc09e7e87926a0e2efeae223dee83e70d2db3546713b2c00a7ec7ae4f7f60b78b807be"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000800)={{{@in6=@local, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000700)=""/235, 0xeb, 0x2000, &(0x7f0000000140)={0x11, 0x17, r2, 0x1, 0x3, 0x6, @remote}, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) io_setup(0x9, &(0x7f0000000200)=0x0) r6 = eventfd2(0x3ff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ac0)='status\x00') r9 = open$dir(&(0x7f0000000c00)='./file0/file0\x00', 0x201, 0x30a) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup(r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r15 = dup(r14) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r17 = dup(r16) ioctl$PERF_EVENT_IOC_ENABLE(r17, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r19 = dup(r18) ioctl$PERF_EVENT_IOC_ENABLE(r19, 0x8912, 0x400200) socketpair(0x1, 0x4, 0x0, &(0x7f0000000f00)={0xffffffffffffffff}) io_submit(r5, 0x7, &(0x7f0000001040)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x9, r1, &(0x7f0000000900)="6cc9e9e7caf76bcda87c02b5319af213cefbf3faab0037037cd14b50699541cabe219cac2d5b73c2709607307ba4e08e178a372cd60bb9566f74fb64dfb89140865aeb01f5b557af6be1f37216c32b1c106f90b4bf5db5e66f20f7527239e6f2fc024a005d6ed14928a5ef86be7c5ad6bf5cf3461626fbc83b18d52da6a626c96d5d390045ac5b42ab078f5be6eb15fa6f742c965f8f33eb8ec76b72d909ccf01d3bf03b54742963892ffd5cc567083fb9175df238130dbbd5954bc7aae8fe0b62e253eddd3744f25a7150626ef0277b3a07e959b40992525d78902b1574c19e3e26e2c8e65a9ad99385005339edbdf1fb84c55670cdc9", 0xf7, 0x9, 0x0, 0x0, r6}, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x1, 0x5, r7, &(0x7f0000000a00)="98a96333f54813b059bd45ebb6fc5042b790344ce37aa4ca5cf22a0884ffc1b35af5d49d76842517bf54ac0b2f2fd0734acdb835cd4df7127d5aa629f9a0ef0c91e34a8e28405397fd3e3ab39bf7981f060e4d2a5ce714827079654eb7444753744a7f86c9e4e83b118bc9231698d84423b3e286f956872f03c16fa3474d72d54431086f833530d057e22108b7c896d63f612b56e16d70e8d62b6e5e0b398a5b659cdf2ec9d5c84cae17ddfbd7eca381c4045f583810df", 0xb7, 0x5, 0x0, 0x1, r8}, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000b40)="244e0230bedc127aad420716f65bc323b524687fff58ef3a7039f183486a35c6c5b6b8759ee78df91b025644113082c6cdc942fa28114da419d072e7ff4b52b2fe6c1d3d72d50c48cf61f68d65e5d051c533b0fbac9fa3809768e5b1817f148018cef1", 0x63, 0x6, 0x0, 0x0, r4}, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x6, 0x7, r9, &(0x7f0000000c40)="3ec4c257ec39e316bc67d9a172dc486475ffedc01e02b9804298a2b1db41221e0f4ffd6d586174e6a0afaf3d6eda8927e48abf1e4c9466f509b489c469a97896cd009f5a8d9e676053b5d1243de3f387d1008ea6b6fd255be63efb64ec3244de6e57a0fcc4bd11cc4957c9a89f7bb73e4c4e28aa21e7fd5279b6bcf67839e0224de9ab3c2103194567c949fe7e7736dbe3b2e891fe6ff99901894a513f8e50dc29ef982f82ced07f5d6206e8b21e36bb037be16e51ed0cd0e15b9a5191348bb0cd9dd4d708927a84625b1246764eaf949b0853b3eaaae086024fbc7926487187a9f05764f866fe7cf983ca30d99c74053325", 0xf2, 0x9ef, 0x0, 0x0, r11}, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x4, 0x0, r13, &(0x7f0000000d80)="8469b18b671811b7065e364771b370b4825435fb988f1c2c0ec67f8e60e4a781470ffae103e53e58ccdb", 0x2a, 0x6, 0x0, 0x1, r15}, &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x8, 0x101, r17, &(0x7f0000000e00)="d483a04e29b273e9074e3ebaea4c47dce9bedaa2f71507d9ff417de6d0e2a222acd802d3483dd02c9f354d752216c7c7baea9f564b7fdd0a1cc7b8ea5bcae53cd55792841c297790018fb19cbf2e6a1f558519fa1ec4d96e2d7ec12553975c7951b0be15c89a50029715f3e6038efd84f3bd87253d8d82a9d4e57b255797a75918b38591dbb805311d7e91b2cf693060f55d1b620e6f2e6917cdcab5da1dec", 0x9f, 0x7, 0x0, 0x1, r19}, &(0x7f0000001000)={0x0, 0x0, 0x0, 0x8, 0x7, r20, &(0x7f0000000f40)="5b07d2bbadf2cb6e6d041e93d9809b65a25eff05a2e22845c97ffb4693a6e6c54fb9c75a9ee1aad2cdf646fc74e739440deee34bd34ef2b75b5c6351099eb746c4ba93ee0ef806d53e416842eb54486a3a69f605d8731faebd3ef2287e4dedad86b1b6721dbb8a38d478dc6a23630cf74c2035d6ff962619528de9331122bd39acd601e3002b632ba2ca5c29bb954bc4ac98454c0f0ff9a6da7ed1ab909fd808b2d900cd88fe33d86036a06a3020", 0xae, 0x5, 0x0, 0x1, r4}]) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f00000002c0)=ANY=[@ANYBLOB="66696c5a657200000000000000000000960c00000000000000000000000000000000f00000000802000008020000f8020000f80200010000000000000000f802000084000000", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB='\x00'/64], @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800f000000000000000000000000000000000000000000000000000280052454a4543540000000000000000000000000000000000000000000000000600000000000000fe880000000000000000000000000001fe8000000000000000000000000000aa0000007fe1b72346000000ff7fffffff000000ff00000000ff000000ffffffff626f6e645f736c6176655f30000000006272696467655f736c6176655f30000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001d000a012c000000000000000000000000000000f000180100000000000000000000000000000000000000000000000028006d680000000000000000000000000000000000000000000000000000000009080000000000002800434c41535349465900000000000000000000000000000000000000000000ff0100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800f000000000000000000000000000000000000000000000000000280052454a45435400000000000000000000000000000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x428) 19:16:41 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0x9) 19:16:41 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {0x0}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:41 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 851.709882] EXT4-fs (loop5): Unrecognized mount option "usrjqhA-¶Œ]9" or missing value [ 851.759010] EXT4-fs (loop5): failed to parse options in superblock: usrjqhA-¶Œ]9 19:16:42 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {0x0}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:42 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {0x0}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:42 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 851.802913] EXT4-fs (loop5): Unrecognized mount option "usrjqhA-¶Œ]9" or missing value [ 851.897045] EXT4-fs (loop5): Unrecognized mount option "usrjqhA-¶Œ]9" or missing value [ 851.944718] EXT4-fs (loop5): failed to parse options in superblock: usrjqhA-¶Œ]9 [ 852.005538] EXT4-fs (loop5): Unrecognized mount option "usrjqhA-¶Œ]9" or missing value 19:16:42 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {0x0}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:42 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {0x0}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:42 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:42 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="7573726a71716f74613d2200f9b4d582d95f0eb7ed6177d276c0199c3ecca39b0b4c0060f02fc4aaa9283bd142e559e225f89445d37bdf99d88be943c88196c0d33a5d7ffa1f8d740e757e8d094f582186da758f6318730b1803e9721b5632cb3cd7ff615019a4cd074525da6d855548832f34a2beba49532b5e691f98fad803c94e4f69c4c5f719f9c99455de0dc99b4bcdcf2ec9517aaf4cd02d3618e81374acffe859f70d043ec9266213991dcfd1d763828bd48cf695136e6246a715ede17db93b293e290c90cf10622d594e"]) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:42 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, 0x0, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:42 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xaaaaaba, &(0x7f0000000200)=[{&(0x7f0000000040)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0xfffffffffffffec7, 0x400}], 0x100820, &(0x7f0000000140)={[], [{@dont_hash='dont_hash'}, {@smackfshat={'smackfshat', 0x3d, 'ext4\x00'}}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) exit(0x9) setsockopt$inet_tcp_buf(r3, 0x6, 0x1a, &(0x7f0000000000)="404fb1b4f521bba23c4061f4b11a1284efad06c9d6c94650d770ad1a6f5120311d9e2e3d33", 0x25) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$TUNSETVNETBE(r4, 0x400454de, &(0x7f0000000280)=0x1) fsetxattr$security_evm(r0, &(0x7f0000000080)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040a2475f862c8d84cf443cda1928913168124d92dd90e0719505d8698f6853533727c561b01d3ddd38fd8a17d274580b3264171c4034bee1f17e6da8d3ffdfbc9d058bca22b4d8c24b3b546904f6386fa7e34f28dc8aeb392f93c"], 0xb, 0x1) 19:16:42 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0x9) 19:16:42 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {0x0}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:42 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0x9) 19:16:42 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 852.267327] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 19:16:42 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0x9) [ 852.379321] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 19:16:42 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0x9) 19:16:42 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0000000000000000000001004eca54024325fb4debd10029327236b8b2f6bc4c01857e57d8c9ecd2c4d30a6bc5ed2b10d76827ac101b11ef1e86bdc1de5266a04b2ef8ab4d6bf425fb5bd1bdd7f2a6606a902756af6c533a77eedbfddd852ef0f9cabf7fcbbf290fe137cb082800569091045f2fececa5634431014569fb7f166974b8d6c9279b2362852eef669a382c49849b4fb5796c07869b45c6274bdec293d1012f239781a99c18231eab8e684a5401d0270201a6c81a6ae2899d04e4f266ffcd770acf25d06fc677b65cfad00cd3b6ac82d8fe7f06cbacfabaa12339d3bdc9fcf1df28681a52b1fb64"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:42 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0x9) 19:16:42 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0x9) [ 852.549295] EXT4-fs (loop5): Unsupported filesystem blocksize 0 (1923657432 log_block_size) 19:16:42 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {0x0}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 852.643953] EXT4-fs (loop5): Unsupported filesystem blocksize 0 (1923657432 log_block_size) 19:16:42 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:43 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:16:43 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:43 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {0x0}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:43 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400202) 19:16:43 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {0x0}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:43 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:43 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {0x0}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:43 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {0x0}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 853.266114] EXT4-fs (loop5): journaled quota format not specified [ 853.310838] EXT4-fs (loop4): journaled quota format not specified [ 853.324118] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" [ 853.339122] EXT4-fs (loop4): failed to parse options in superblock: usrjquota=" 19:16:43 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {0x0}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:43 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0x9) [ 853.362659] EXT4-fs (loop5): journaled quota format not specified [ 853.376441] EXT4-fs (loop4): journaled quota format not specified 19:16:43 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0x9) 19:16:43 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaaac1, &(0x7f0000000100)=[{&(0x7f0000000040), 0x0, 0x100000001}, {&(0x7f0000000080)="d3dee87580752f7df6316ad2c12b49a15f57287406b9c689a08fb884faf0cf41157066269cba8dc4f6b8c68bc987e64504a2fceb90cce05d58f329fc2809b567acf604ea0c89686a46d00e4c9015decb1a6a19e18ac803b0921a5109c148b9a937fd", 0x62, 0x7f}, {&(0x7f0000000200)="bf76e25df2cb1b05bfbdda01386c1f5605cd3b808e502a164cdbba15a0a53ed8102de9e20dbf7754b3e3214b1cef99b3e801361b65f1e65cec682437671d465742e07fc367a185ca84303b3f7ecb4bf32ec058f2a429d8a991a869cbd5a4f7bca0e984fe680bc8cc96dd140acb0f8be67c619ff52a8ff1be883ddd23702cbca2ea4a8ad6e0b35da15c63a636592f2813c774e2d2518b11ecdd1b9398795e3cd305220ca67b16f920593a83c11e9d0e1845600029446a30afe417320752ae5344ff144a53563c93a559631b6af2588480743e5c819c4412482163287bade1efe8deffc7474b5a086089c9ae8ae97999f15d2ca7c910", 0xf5, 0x100000000}], 0x1000000, &(0x7f0000000440)=ANY=[]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x600000, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='pids.current\x00', 0x0, 0x0) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3b) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x5, 0x6, 0x5, 0x7f, 0x0, 0x10000, 0x18480, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffffffff, 0x0, @perf_bp={&(0x7f0000000340), 0x8}, 0x20, 0x2, 0x5, 0x4, 0x7f, 0x101, 0x2}, r2, 0xf, r4, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x85) sendmsg$nl_netfilter(r1, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000640)={&(0x7f0000000440)={0x1f8, 0x4, 0x5, 0x10, 0x70bd2c, 0x25dfdbfd, {0xd3c3b19c6d460544, 0x0, 0x8}, [@typed={0x8, 0x4b, @fd}, @nested={0x1dc, 0x9, [@generic="4d48662469474e070985fda5722807e950046cfe7c51c51a801b0339ac8c2711fa2b05da3fd65b3d0fece545baa762cbd6fc287bc265df3251d7b0f92f0ebb0b574a5a30ef7647c270c2e30dba4b254eb768c7e26b61d0cccbcafc1b6dc17db13615cc29198f8af3c04eabe13718dff4254b4e8ad3bab19eaef86597dd8aac46447e0560e60e1de2bcde1c9b201533a66f7ebce19d01ed45d878f1f62e50150da6e6237e3be91718e20de1e72d726e777232f4d6c7baaabb330742e44ec0290b8f99fd0e0ea67d64fcc5a24797a0410fd2b66904679d514752445e44df34c25a72e42bdd1cdb970504", @generic="c217545c478c3d731bcc14835f38774ef265854db697591d723d6f2e719c9687bf790c3dbd821be5a8cd", @generic="bd4320b82870fc4348b59d8755c8e592e68e9abb02492f45d82c83c8d4b34e", @generic="22cc47a353cf62c9148778b5b6e7bb5020f3b2d389e9f1a49a2bf1a53713cb3d4cf129c4075b35e0d6530b0b95423ead0b0bf42e21bef78041de465738a0bbcac035e5bad5920fce17014b18c80eece48a904fefe19f3b5f35184a2aebbcd172d4330728512bf303bdf74ca67cf0a98d8a420a3b948d45255a230c46eb20440b1df944abc3ced29dffdabfd1808367d88c8ef019c7459853e5cea7624bed19827e20b7de0ac2"]}]}, 0x1f8}, 0x1, 0x0, 0x0, 0x1}, 0x40) [ 853.452877] EXT4-fs (loop5): journaled quota format not specified 19:16:43 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r0) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r2 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r4 = dup2(0xffffffffffffffff, r3) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r5 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r4, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r5, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 853.507940] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" 19:16:43 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0x9) 19:16:43 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0x9) [ 853.551102] EXT4-fs (loop5): journaled quota format not specified 19:16:43 executing program 5: r0 = socket(0x1, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) accept4(r2, &(0x7f0000000280)=@rc, &(0x7f0000000340)=0x368, 0xc0000) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r3) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@initdev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000300)=0xe8) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x60a32ef6, 0x2d, &(0x7f00000000c0), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='mt\x00\x00\x00\x00\x00\x00\x00\x00\"euid<', @ANYRESDEC=r4, @ANYBLOB="2c16b8815f4152f3657569643e9b90e8788d429e0000000000000000", @ANYRESDEC=r3, @ANYBLOB="2c6673757569643d629c1d36800034372d613531352d313561562d393734342d31313835613672312c736d61636b66736861743d6c6fb42c00"]) socketpair$unix(0x1, 0xafb8a102e61bea0f, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$ION_IOC_HEAP_QUERY(r6, 0xc0184908, &(0x7f0000000240)={0x34, 0x0, &(0x7f0000000140)}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 19:16:43 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='e\xed\x94]\xbe', &(0x7f0000000100)='./file0\x00', 0x2000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000000)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:44 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0x9) 19:16:44 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0x9) 19:16:44 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r0) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r2 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r4 = dup2(0xffffffffffffffff, r3) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r5 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r4, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r5, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:44 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:44 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) setxattr(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)=@random={'system.', 'usrjquota='}, &(0x7f0000000140)='$(\x00', 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:44 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="7573726a71756f74613d220054c0fab1215b9b63930dad87960e0b9714e305006e70275b4b"]) getrusage(0x0, &(0x7f00000002c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:44 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{0x0}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:44 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {0x0}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 854.021658] EXT4-fs (loop5): journaled quota format not specified [ 854.050154] EXT4-fs (loop4): journaled quota format not specified [ 854.079552] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" 19:16:44 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{0x0}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 854.156195] EXT4-fs (loop4): journaled quota format not specified [ 854.159734] EXT4-fs (loop5): journaled quota format not specified 19:16:44 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {0x0}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:44 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = signalfd4(r0, &(0x7f0000000000)={0x2}, 0x8, 0xc0c00) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x17) write$binfmt_script(r2, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\\security,!'}, {0x20, '\'vmnet0#\\('}, {0x20, 'ext4\x00'}, {0x20, 'usrjquota='}, {}, {0x20, '+'}], 0xa, "c8187247ecc4fb4cc0bc71a95a6f3eeaaeff073acc264235d938d00f1d5c71"}, 0x55) 19:16:44 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r0) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r2 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r4 = dup2(0xffffffffffffffff, r3) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r5 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r4, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r5, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:44 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 854.288428] EXT4-fs (loop5): journaled quota format not specified 19:16:44 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {0x0}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 854.334244] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" 19:16:44 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{0x0}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 854.375180] EXT4-fs (loop5): journaled quota format not specified 19:16:44 executing program 5: r0 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r1) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}, {@max_batch_time={'max_batch_time'}}, {@noinit_itable='0\xcaG\xb3\x02\x00'}, {@resuid={'resuid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 19:16:44 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r2 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r2) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r4 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r5 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r6 = dup2(0xffffffffffffffff, r5) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r7 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r6, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(r1, r7, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 854.467881] EXT4-fs (loop4): journaled quota format not specified 19:16:44 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0x9) [ 854.515178] EXT4-fs (loop4): failed to parse options in superblock: usrjquota=" [ 854.570883] EXT4-fs (loop4): journaled quota format not specified 19:16:44 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) fdatasync(r0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) r3 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r4) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='usrjquota=\"fowner=', @ANYRESDEC=r2, @ANYBLOB=',uid=', @ANYRESDEC=r4, @ANYBLOB=',func=POLICY_CHECK,euid>', @ANYRESDEC=r4, @ANYBLOB="2c636f6e746578743d6e746578743c757365725f752c66756e633d4649524d574152455f434805004b2c726f6f7463bc0462e7279aa1877a089e225289a2ae6f6e74657874645f752c61707072616973652c726f6f74636f"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 19:16:44 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 854.645058] EXT4-fs (loop4): journaled quota format not specified 19:16:44 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0x9) [ 854.693130] EXT4-fs (loop4): failed to parse options in superblock: usrjquota=" [ 854.732793] EXT4-fs (loop4): journaled quota format not specified 19:16:45 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0x9) 19:16:45 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="4f2141d7a4ce3928702420498a6d0fecc5ba6f0c9914964f7b93882407cf9f4c2d67a64e81e2c5d8ecc85c75df3c8c506052f0b7cc84e32cf8e8afe070e3b1d3a597743b0cf03aa848046a28550309190a9a98d89f152380adbcd47b864250623e497df9a3f20adac611ba9ad9f11dc351d61c745bc972569e28dbeea1955539b355e2ac984370460df57a19d36a88fdcc668c569676ae903d91326d07af0789cbc2a9069ccb66c9f16961fb4d7d0422a36a95129e30a9e9f39603000000000000000000"]) socketpair$unix(0x1, 0x9, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) accept$inet(r1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:45 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734463915e38802a9d8aea872943afd874e1c98b479a73162700f6d0e02f8e63ba8863c00000000", 0x30, 0x400}], 0x0, &(0x7f0000000000)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:45 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:45 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {0x0}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:45 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 854.895301] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 19:16:45 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r2 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r2) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r4 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r5 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r6 = dup2(0xffffffffffffffff, r5) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r7 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r6, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(r1, r7, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:45 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000200)={[{@usrjquota='usrjquota=', 0x22}], [{@audit='audit'}, {@appraise='appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x57, 0x32, 0x66, 0x30, 0x33, 0x66, 0x31], 0x2d, [0x63, 0x39, 0x34], 0x2d, [0x66, 0x35, 0x64, 0x31], 0x2d, [0x31, 0x33, 0x38, 0x30], 0x2d, [0x1, 0x38, 0x6, 0x65, 0x7a85a1fbbee1c854, 0x39, 0x37, 0x39]}}}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000000)) 19:16:45 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {0x0}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 854.969377] EXT4-fs (loop4): Unrecognized mount option "O!AפĪ9(p$ IŠmģÅŗo ™–O{“ˆ$ĻŸL-g¦NāÅŲģČ\uß<ŒP`Rš·Ģ„ć" or missing value [ 855.082733] EXT4-fs (loop4): Unrecognized mount option "O!AפĪ9(p$ IŠmģÅŗo ™–O{“ˆ$ĻŸL-g¦NāÅŲģČ\uß<ŒP`Rš·Ģ„ć" or missing value 19:16:45 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="8b1210e46f00"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x4000, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000040)) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:16:45 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 855.161812] EXT4-fs (loop5): Unrecognized mount option "appraise" or missing value 19:16:45 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {0x0}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 855.222229] EXT4-fs (loop5): Unrecognized mount option "appraise" or missing value 19:16:45 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000200)="25bca274769e620aa734a60872e2073282fff457d15b3565fa009de0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef5b14986e7ee4562994df397b5a1e2e0f81744cc16af48f4114399843433b6471c5b813ce31", 0x6d, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="006039c3a61021f87db0e731630b56e8ce13e1bf4a2135185f37b4a212cc791a769d8c67fee48689"]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$set_timeout(0xf, r4, 0x0) keyctl$restrict_keyring(0x1d, r4, 0x0, &(0x7f0000000280)=')-vboxnet0@wlan1$vboxnet0cgroup{\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$netlink_NETLINK_PKTINFO(r6, 0x10e, 0x3, &(0x7f0000000140)=0x6, 0x4) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@rand_addr="133fab2d0e8b55a6c8d0cc4c88584a59", 0x4, 0x2, 0x1, 0x4, 0xfc00, 0xfff}, &(0x7f0000000080)=0x20) close(r3) [ 855.282808] EXT4-fs (loop4): Unrecognized mount option "‹äo" or missing value 19:16:45 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0x9) [ 855.334329] EXT4-fs (loop4): failed to parse options in superblock: ‹äo [ 855.385946] EXT4-fs (loop4): Unrecognized mount option "‹äo" or missing value [ 855.423129] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 19:16:45 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:45 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0x9) [ 855.473882] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 855.482158] EXT4-fs (loop4): Unrecognized mount option "‹äo" or missing value [ 855.505509] EXT4-fs (loop4): failed to parse options in superblock: ‹äo 19:16:45 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/52, 0x34}, {&(0x7f0000000200)=""/248, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0x1000000000000110) 19:16:45 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:45 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0x9) [ 855.531209] EXT4-fs (loop4): Unrecognized mount option "‹äo" or missing value 19:16:45 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$smack_current(r1, &(0x7f0000000000)={'!-[\'wlan1GPL/em0'}, 0x11) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 19:16:45 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="7573726a71f59d74613d2200"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:45 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$TIOCGRS485(r1, 0x542e, &(0x7f0000000100)) r2 = dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) r4 = dup(r3) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)=0x0) fcntl$setown(r4, 0x8, r5) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r6 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r6, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0xfffffeec}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:45 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{0x0}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 855.746944] EXT4-fs (loop5): journaled quota format not specified [ 855.783937] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" [ 855.798563] EXT4-fs (loop4): Unrecognized mount option "usrjqõta="" or missing value [ 855.829662] EXT4-fs (loop5): journaled quota format not specified [ 855.839595] EXT4-fs (loop4): failed to parse options in superblock: usrjqõta=" 19:16:46 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{0x0}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:46 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 855.863435] EXT4-fs (loop4): Unrecognized mount option "usrjqõta="" or missing value [ 855.916789] EXT4-fs (loop5): journaled quota format not specified [ 855.934931] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" [ 855.960134] EXT4-fs (loop5): journaled quota format not specified 19:16:46 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{0x0}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:46 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 855.986045] EXT4-fs (loop4): Unrecognized mount option "usrjqõta="" or missing value [ 856.016399] EXT4-fs (loop4): failed to parse options in superblock: usrjqõta=" [ 856.058870] EXT4-fs (loop4): Unrecognized mount option "usrjqõta="" or missing value 19:16:46 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0xf}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffffffffffd7e}, {&(0x7f0000000700)=""/4091, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0x100000000000007a) 19:16:46 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='usrJqUota=\"\x00']) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = fcntl$dupfd(r2, 0x406, 0xffffffffffffffff) ioctl$TIOCGRS485(r3, 0x542e, &(0x7f0000000000)) futex(&(0x7f0000000040), 0x80, 0x1, &(0x7f0000000140)={0x77359400}, &(0x7f0000000200)=0x2, 0x2) r4 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 19:16:46 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) fsetxattr(r6, &(0x7f0000000380)=ANY=[@ANYBLOB='os1.zppp0\\bdev\x00'], &(0x7f00000003c0)=':\x00', 0x2, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r7 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000340)={'netdevsim0\x00', {0x2, 0x4e22, @multicast2}}) ppoll(&(0x7f0000000000)=[{r0, 0x2000}, {r1, 0x8000}, {r0, 0x20}, {r2, 0x5000}, {r4, 0x80}, {r1, 0x2118}, {r7, 0x400}, {r1, 0x20}, {r8, 0xc0}, {r10, 0x2040}], 0xa, &(0x7f0000000100)={0x77359400}, &(0x7f0000000140)={0x6}, 0x8) r11 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) socket$unix(0x1, 0x1, 0x0) r12 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r12, &(0x7f0000000200)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f00000002c0)=""/74, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffda9}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:46 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = getpgid(0x0) write$cgroup_pid(r1, &(0x7f0000000000)=r2, 0x12) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) sync() readv(r3, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 856.320973] EXT4-fs (loop4): Unrecognized mount option "usrJqUota="" or missing value [ 856.359843] EXT4-fs (loop4): failed to parse options in superblock: usrJqUota=" 19:16:46 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 856.385865] EXT4-fs (loop4): Unrecognized mount option "usrJqUota="" or missing value [ 856.479653] EXT4-fs (loop4): Unrecognized mount option "usrJqUota="" or missing value [ 856.511575] EXT4-fs (loop4): failed to parse options in superblock: usrJqUota=" [ 856.553673] EXT4-fs (loop4): Unrecognized mount option "usrJqUota="" or missing value 19:16:46 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:46 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) readlink(&(0x7f0000000000)='./file0\x00', &(0x7f00000002c0)=""/154, 0x9a) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fadvise64(r2, 0xfffffffffffffff8, 0x8000, 0x5) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:46 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 856.772844] EXT4-fs (loop4): journaled quota format not specified 19:16:47 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000000200)=[{&(0x7f0000000000)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000100)=""/68, 0x44}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/228, 0xe4}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f00000002c0)=""/254, 0xfe}], 0xa) [ 856.815647] EXT4-fs (loop4): failed to parse options in superblock: usrjquota=" [ 856.840939] EXT4-fs (loop4): journaled quota format not specified 19:16:47 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 856.916044] EXT4-fs (loop4): journaled quota format not specified [ 856.932135] EXT4-fs (loop4): failed to parse options in superblock: usrjquota=" [ 856.966661] EXT4-fs (loop4): journaled quota format not specified 19:16:47 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) fcntl$setown(r4, 0x8, 0x0) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_DISABLE(r6, 0x2401, 0x69) ftruncate(r3, 0x400) 19:16:47 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0xfcc4}, {&(0x7f0000000000)=""/126, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x3ed}, {&(0x7f0000000600)=""/265, 0xfffffd74}, {&(0x7f00000019c0)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0xffffffffffffff6f}, {&(0x7f0000000300)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) listxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=""/51, 0x33) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$UI_SET_KEYBIT(r4, 0x40045565, 0x2e4) 19:16:47 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:47 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$P9_RWALK(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="230000006f02000200900400f7000600010000000000860000000400000000000000"], 0x23) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:47 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:47 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) syz_read_part_table(0x0, 0x2, &(0x7f0000002100)=[{0x0, 0x0, 0xe68a}, {&(0x7f0000001040)="c9", 0x1}]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r6 = syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80400}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x3c, r6, 0x200, 0x70bd28, 0x25dfdbfd, {}, [{{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x80}, 0xfa44bb498b67d844) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x840d0422}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)={0x84, r6, 0x800, 0x70bd27, 0x25dfdbfd, {}, [{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_FD={0x8}}, {@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8b, 0x1}}]}, 0x84}, 0x1, 0x0, 0x0, 0x20064011}, 0x0) sendmsg$DEVLINK_CMD_PORT_GET(r3, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20024000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000340)={0x16c, r6, 0x800, 0x70bd2c, 0x25dfdbfd, {}, [{{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x3}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x3}}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x3}}}]}, 0x16c}, 0x1, 0x0, 0x0, 0x1912858fdead88a6}, 0x10) socket(0x3, 0x800, 0x91) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000200)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) fsetxattr$security_selinux(r8, &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000140)='system_u:object_r:udev_tbl_t:s0\x00', 0x20, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) getsockopt$IP_VS_SO_GET_DAEMON(r9, 0x0, 0x487, &(0x7f0000000240), &(0x7f00000002c0)=0x30) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x100000, 0x0) 19:16:47 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3b) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) sendfile(r6, r4, &(0x7f00000014c0)=0x10001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001380)={{{@in6=@empty, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in6=@initdev}}, &(0x7f0000001540)=0xe8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYPTR=&(0x7f0000001280)=ANY=[@ANYRESDEC, @ANYPTR=&(0x7f0000000200)=ANY=[@ANYRESDEC=r1, @ANYRES64=r2, @ANYRESOCT=r3, @ANYRESHEX=r5, @ANYRESDEC=0x0, @ANYRESDEC, @ANYBLOB="19b69c543ac4e0e1a4419da6fdae0a315285225023f2f32c6a5f657e01932f49938573e7424c74f183f90adf6b5b34a591b2e0908a417e5c23c64a9381ca51e5f53c4389e4c295979110a6c110d9dc2fb3af299932b5c320f2789c2f223df29a61202b7a865d0a570d60dffd220206c21e111219fc43e2ff5c5c950eafb5ad2609672c1986fee825981ca84edee2f398d568ae92b235d3b1ceee8ec0adaa34063e788f9fdf5b888c4353b914e2670180b41c3eacb4877a26aa412f1159574c705360ebfcf2eaf0d95a8b02b14f3c9c0f517a388ca84c084788aff63eda3e10c82a68e13ceb63c385e6de708c177c837e11376dc677deade2d70dcc93d1a311f9309fc4a1c1ce5249cc3ad2ec2111af1b352c3e5fd65601c10a0da500de38afe4953912e8f1d23598e91b26e7e10bcace312756e24055345f14e5fe1678f5fc154f0fe9fa15c8972e03bfd8ad8b874c5f93f8407fef99126ba5ed8001a4f56b55cc43cc5321c89ba97fbdc36fffc6cf7e25318c5620347a82693ed2605cb3d511290b80caac02c553c01326c61c6f0a4c82ddca796aac609355dccd2c762468e0df18cbfccecece30facc95b2d0a6775e0960407c62d0e7251793be093b1ac3b067d083b5a04a3dbcd63e717abe664d1df89fd83c1353cace1ae4216f792360bf33903459456bdbe98e22cf2aa6619431d4c8760dc45ce922cb8859c0702b2c89f5a1cff020880da53d6c25fea75706df4b651ae5bdfe3b45205451c1c7a3f3f0d170720b3412f27086ddbee67bd70e636a3f6c799c7ea65facd02863a7d524803b5c095cbb074e92a67ce5eba5e8347d4896c44414202dd422fce1387faf2c65162f4d7b44d07bb7ac43947dafae27bedaee93ef4615f50609e53bc4032e0f63039818cea29525fe7c741d3dbc915967c30a9b0a0c2b5ee81a0aa7a7906e54ff88c566af3bff44f1a3fb9ede0552531c8f09b2feb292eec1a997fcb8f0c240d87f35dbc6da6d27f486f691e10b41dde1c179e97ff983499a186c4d202f6b8d578525b95e3bfb7962ebc233ff516cbb3527e222e68f181caad81de27dd4da67d3a9646755694ce82d76859c3c2772abe1a5334d84779baeb8e76d7d7e56f4c7594036610ccfaed896d02306a1fd63b2456a09fc1b583d5a7a207c1b98248ca038cb4c7b58dd60048d3d1c5d40df2a5436b7a822803b69e926a07210b78fb7e1641d0d3886136669fa0ef5e9024a2ecb6192548e23d1459186c4514472b55f93bcf7edd785c17baede2130cc1dd0cdfd408a597b5923d7f43ae37a8b9633b8a7a877ad04b1d3a45962a7f2b8322fddcee7f8c94556494e6aeadf23fd42d470a7205f5c5dd3c64e3c6e7e6c07fb7ebf40660a0b8bfcfb55ef91335856ee95e15307ec42449581bed709ae3f326a9039b80f34509e230b9b8fce3eb8efa923ba4c9b4df3dff0b45e4817766ed0b3234c397133e9e1ca26517100c1358ed756eb2212b129e8eeceb55784f758e73be5a311bff918737560997df27af2927fc45d23e6d59e6342873327e99defa6c2f9b8bd7500415a3fb4c783cf1597ddcd6c0cb34ad787984308490f2792c571b80e96962dca37f3f6854fac8a4e5fb6b1a53e1e9cd20460c336c3b618638337bf49c3c2fdfc6467730468da5baf4a9374f3f44d399c93b63760726a9bb7c966317e6836f03e3cf119d201787c5f882b37e25c42e51745448926c405162d73a1adf1fb2f820ff34ba4e9bb544553ba310a2a8e2244fe22d92e9220536b055196137fee481711884c50c0e0a7f11455e7c3d8e53941d49bffda234f8c33cadc97f4fc77d6dca500f19183a320f1ae7227c0756424b8a60fb0bb374d46f7f752169a1934cce48c9ba8e171184f70f0447817a772fa97e4b377ae71d9fc68b5adf1e3eb80934bc8f784f25ba4ddff06806d7b9c618b66d96897c38c9df4f955b2d3054017ed597d250b10deb701f6941044c8acd6f0d6632c44c3a55de57dad5400b415578388a6cf20b801903ed6957f1b5c4beafc8e4978bc44d308f618770c8a729e472b05e1bf14f2a04a980a0ec880f6e860cc53fe76c2057f3bfb8672498b7565aebed43aa66815cfb84bca6871e5570c84b8266fe6780d1f979a767520d701d828cead9e7a7bfd05875a37e691e7cacb2796c0c4163a20f51a424fe4cd8816a0a7cc310a19f148288e3a6c57c71f6b65a397353803d3b7dfbf119e5eb56ea57fb6ca2ec3320cab1026df79504e40ab7b6d3bb926d03129a04821fdaf23ae095160812ee883d6824a00a83a21a457159d381ce13ea7e83951a3bb536ed63391c7d5d2bf50bb32bd15fd9eb52ee48a2af0632a9f826613d9c5353bf94e7c4c296bbe96e9efd6a1a45d224f606f40d3c511383e58260911a7eb2879dbc63c411514085ffdd0a3b7710b57d80bb055daf67f5292838c7a021d3baf712ad080808e8c7f8d978bf16d47542cc649e529fa31b3834a90d99a699fd986d1ae4da0312f1ace82b58ad65a7d76faf24ac10894cbf625616b4054b1dc70702212004dc266320117d5fcb62f0c216d97a2d80f056a73e38ce4774fa3180d2ea567dff87510679426a72984a7bd73340564598fc09933a2fac9519d609ecc6492e5cae761c09ac4844c427321f20a4739365296e687ee8ba156c9e75df9d2d7337316b898538c7315c2e12f386bdc71956ac69597a9f6ec8e79cf0176690b5bf59508457ea45ebd47b73a2b4885f115a62c3dc794f39c65567b9c6685127e598a050e6023bf45a583064fabfc6c4cc928805c34b7de77a06f39666767440f00502ebe835a1a0e6cac0f28978be1d43da5063a15482d657c55f1c3cfb412a539a9749ee6dd0f89360cf060fa536a30175d662e69fc7c19175dcc2d471b2d856c136a564b7b3213212b432b55465127087b31da8143aac7ff55154cbebcaf471cf30aeb63856a1931b8c78ae06573d058f80dd9c54f819520bb958ea192c7540eaa7a84319198c1024f9843cd9b6625279b7976b2b12ce8318449637c93160c4d961e03dbad872ebbbdac70bb3086870c438a3b3524fef724a94dc5b5e7182bed10f420353b175fc11b51acdcad8790ebd546e349f1f91199766e876c55e9cd13135550ecd0e5531e943efe73e9d0132693aba96576c1f86286c2ae37e54e10071d965690c67eb44a5fc0f498257d42adb57f1248ad4b7e390b2f763c7151171036f482863fb3ecfb6645c864741134f59a18b472abef47c78f32fa71a23f93a9f223a2707f118579152d6fe4b926855e78c3c03042fa85a525b7bd2e72820199334bb15a10cf2a5596e107b90610db0e66d933e59439ee63c29162f47f3efaa20746ae0af46a5017d5466ce81f09c247586b8319fc87be226e90edf5a90bd748399cc63919e32eff0680ff9288b583a4ef6e2d0846206abb9f34fc14d33db42d742383b0468b921dccd2d26d725b4c30526983e0ce6fb95a8a6cee0d7a79eb23d0a02e44098bbd95e6b9e2a85e5f31074966ec3673be71f5745e265b6dbca74699aa6442b903350d2468f2e7a2c2bfa672e32cee39bc6b42c32fc16a0230d83742bec490ec0c08c6f0465abfc16266bd3d74bb177adb19437602ac4d77f26bbefaa879d831f094cbcddedef7deee08bb2a4f58594ef6b1f4b27b94d729c927d58c37461b4b516631b54d4f490f47bfa69f6d60fa88754c80465ab0bbcbab4a858305bf11f41e70fa54228cb55faf56570835b0aa870e82ade3028e8716a475d5b2afb7fe4b0fa9e96699e53447d1145279131d0ae4e1e38415533fbb42d0d277afdad2b3735f52228329146188a496ad3a4de8d331dbac4db35a746434c76af7aad79a1578907209f3ce398a73a0a1879c4753df70f2bc42de4a3575bf6bacc8254d419abda2792ea1e51a57e1f5c9ebd1d5e08840b027df5be91dd9ffcdb0d09a92196705997d8693700b6ef2931cae7e2607b689fda67f3478b2afa88f7679138d608cfccef9ae827476951e8a19ff6aa30eef9a29521a8e7c15c345eff5255181df1ed8024011b4a614b9546b77dd559e7ff466ca8b72602b89c09a2658f69b22f49fae7570b2c50ebe25cdffa0e49d37776b003ce5ff2d4f942ef4f259497baaa630bb0c8797da53e747ae9b03ee980000faf8d1b4cea124c758b6486a479e2b6e2dda0e3679651c0c45cc1ddf3950e2bf67ed62c315b4e51d93a082469df3e858dc3e81f381931f42936df70ec3632df0979c36b2e099e0c3e3954be9da2462806cc39ff1c3c2dedcbe2b420f9b37535687bb275e19629ef9ed9596223d0e55852614d2cef3b22d578f354cfd02391e72e7d7bef308f3827d86e8deb6ed4eac6a114147938d381621110ed996c0e0ffc4d44b6dc36e0da8d0e352c5d1b3a9cee5c7f2cf3777828063b885059567097d6f18db43450440761116ea2da3ba9b1a2e6c016f907cb9baeb4b2300e3956a56396e7bc7b8e7b5715c361739be9b8d1710a95b9408b3dd0c47731cfdad8398d304f4266d003a136e2b1011d5708f26df8d2c4c5f02691cf06dd7a075ef09b5ff25f7a3268e7cd315d8d8f116a2623e10f3b4855d5d1738409b7c43f6d94fd3a493dfebc02ed78422a75838e3ccc0721a2c3ca6461f19797f140ab4a99e63ee426d654ea6230716029a1e8ffdbabf750907cae60d4ae14276ff81922b435d8bf628b602c020814d26928c569f43a8d9d433eb7749c8e6d62d0cf02789665234a28cdb03fe8971d76e8ce07cbba2bc0d219a8177c49c65542700b2d91bb0a388895625781aae9260a059638535d530fa22e574b258cad9744ce504a907dc21e0a2d0b86aa7efc5f46c6a94da997af722cbe3363c75763a5c2b077ac03138283e9c07aad3aeaf962ff3d08c631222ff0477f2ddf7677eb5e12728807b88b2c62ea6d4f4f6d7d26395a6b107fdf86b8a2ca99fd46c14d8538b923ba6d892fb409ab57bf3f06a5d8b67cd6e8f6e9c3f54fa79d44eeb7358092b6b6955f33cd265335315250d5b14c13d41d8cb531ef03c8e5d6f4773842088232348663c6e360ba13571f42ca923fec7600aa004d9c83745e4d36638f542b4a190baff836462a7d6ca6bd0212a2962c79a10a23c10648ab5b50e507af4c24c50b32db7238c57d91064a855a9d5defe034d159548fb59bff80daf6af8460e60c0b82f8eaf83380f4e6c0abc33a661bd5bf1d2cde260f42ace4ab31200fd3428dc157d796e71595af7e6a02ea400e483e32c0f5a4091e4e1f72464fa7a0a25321692ab5692f87a2c7d7390cd213c6cbf2bf23e13ad1e434de05d12d56387538c1d81f1d407e18ed6e166181a9c25fb8dc5e7c852df962d8957aa5ed788f91d3b97ae408a8c1c1fd828fe6efbbcecad6c78567c7b2b64ccf845c07f618410c531b1aa1878414328a53bb454136d0101f39efcfb397ddfd0751c95e9f6518ac15b3e62dd4d97dd289cdbd9c3be2767cdc6d648e8f3e35025d4c1020612164143a3e1dca4c54bda7352cc221a5df69dfcd94eead2bcb5dd4bcce3172f8f63f3b7207503cfa7c08b58e5b520c4b22b19c85c875244862ef32b12e382588205fb8c37ea68e2fa5648b229cc5b25b611896f0b9668f5f934102d677c916817f3406538abe3dfe876f1356c6b4d4adc15299d86d270f5308c6829744f62e74226ec16e00b10f7e81a894023f0b0167d7d524c47f88815cb6e82d8b0a2c49c5590125f57b9cd62898317bf6c255f55318637904c2e683ba49caf1b244f1adc65633aa18e93a1d6f703de2afa9e1ab4763857735bd763", @ANYRES16, @ANYRES32], @ANYRESOCT, @ANYRES32, @ANYPTR=&(0x7f0000000000)=ANY=[@ANYPTR64, @ANYPTR64, @ANYRES16=r8], @ANYRESDEC]]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) setsockopt$packet_int(r13, 0x107, 0xb, &(0x7f0000001500)=0x80000001, 0x4) r14 = dup(r11) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) r15 = openat$cgroup_ro(r14, &(0x7f0000001300)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r15, 0x400454d8, &(0x7f0000001340)=0x9) 19:16:47 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 857.532431] EXT4-fs (loop5): journaled quota format not specified [ 857.559137] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" 19:16:47 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="7500e17236fa8fad92d4155642c02e1be63994f4abc26b9514692a8160aab8299b88145120202eb92ddb55e5821fafb99eac409bfc67f3e28c924894e182a1cb63807f63b37f733a68df41ef03126bbb91818a70160ea6e36bd7996284bc35ea40b727836a5f5a5e8320ef72690c3d86bd8066cac0417b5a4b2000ffeba87d2ba8bcb9d696e180010b132a5cbea01f45fc00a9edc5fe71fb142a90bc4eb7a2703503353c7ce05dd5fa30d6fa6bbea91849635ac2ec41428b16a7a2d57fd190dd17e7eb590d62ccecda3b4e82efb527929549952016e73ceb7d30b25d31ba5ff68d4c23346e81950cf59698be3a2c70f12995ac0d5c6ac6e0"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$packet(r1, &(0x7f0000000000), 0x0, 0x4000, 0x0, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pread64(r3, &(0x7f00000002c0)=""/245, 0xf5, 0xfffffffffffffffd) 19:16:47 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) readv(r4, &(0x7f0000000340)=[{&(0x7f0000000200)=""/236, 0xec}, {&(0x7f0000000300)}], 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) sendfile(r6, r7, &(0x7f0000000000)=0x5, 0x7) r8 = dup(r5) mprotect(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000000) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r8) 19:16:47 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 857.600479] EXT4-fs (loop5): journaled quota format not specified [ 857.676863] audit: type=1400 audit(1574709407.897:54): avc: denied { relabelto } for pid=3481 comm="syz-executor.5" name="UNIX" dev="sockfs" ino=120514 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:udev_tbl_t:s0 tclass=unix_stream_socket permissive=1 [ 857.714811] EXT4-fs (loop4): Unrecognized mount option "u" or missing value [ 857.723247] EXT4-fs (loop5): journaled quota format not specified 19:16:48 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RCLUNK(r3, &(0x7f0000001ac0)={0x7, 0x79, 0x2}, 0x7) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$IPVS_CMD_SET_CONFIG(r5, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000100)={&(0x7f00000019c0)={0xd8, 0x0, 0x2, 0x70bd2d, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x6b}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x675}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x7}]}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x48f}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_DEST={0x40, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x9}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xb7}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast1}]}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8}, @IPVS_DEST_ATTR_TUN_TYPE={0x8}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}]}]}, 0xd8}}, 0x0) r6 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000000200)="9f26e331e0f8fcecad7de4bd7c8643e69e7cfac9d57dedb9c137af0406ee196cb684b964fc860363b3065a063c8a17ae485ba3c0f42b00aec3d197ec876cd725919668a23644bdef2cbc91a3a4683f9b70f42d57b64ca6a2a35cac28fbc3bf23c6be2c394055a1d5ff9328d05c7d8ebeaec28f963b513aaf70109e386e205aa45daa00f3ae2304210385e1096d24ad98412f843b9fb753f6d6501582938950b4a39b250acd0a977d0decfb33481930f2a57e84ccf69ff2f3bdaf093f34b6e85310a135e86ab7f36c27270edc5b986a95dc5e70c5ecad2e0af23a512b7aea027e27ac664ae9db27", &(0x7f0000000300)="a8b993bc066eb8b84e5358a9289b42c7db9285de1570f07be6c4edecedc72148c2d8022ca15ff255e2eaa0b87c046e50c144db79cdf60a2a0bb8f1c26519387807dff250ee5b630cb003e77769600a18bfed2ee3dbaa877626cf6d7606e1a02d46172d99f2824d5d7debec26fcda097c58388d781e421d4fd3a9ed86859f91c42f4c95625cfc606423e2b25d75830ec2372ab1217597a82911759bd1381e74ffc77a47c03bb2634ddf4958cd64cbb00b6ef232a09b39e70e2b7c4429de7ac055cc82", 0x2}, 0x20) readv(r6, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/75, 0x4b}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) prctl$PR_MCE_KILL(0x21, 0x1, 0x0) [ 857.748846] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" 19:16:48 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 857.809655] EXT4-fs (loop5): journaled quota format not specified [ 857.811757] EXT4-fs (loop4): Unrecognized mount option "u" or missing value 19:16:48 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="6cfd0d76ef35431d7573506a"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x40) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x6) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:48 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$EVIOCGABS0(r4, 0x80184540, &(0x7f0000002a40)=""/4096) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) dup3(0xffffffffffffffff, r9, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup(r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) openat$null(0xffffffffffffff9c, &(0x7f0000003ac0)='/dev/null\x00', 0x480100, 0x0) r12 = syz_open_dev$loop(&(0x7f0000003b00)='/dev/loop#\x00', 0x9, 0x5000) ioctl$BLKIOOPT(r12, 0x1279, &(0x7f0000003a80)) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) syz_read_part_table(0x1f, 0x5, &(0x7f00000029c0)=[{&(0x7f0000000200)="ae2ce8d69f50ea72ec93ab2a6f94f2c12b85aa3790376258926459f52400d0bd8d37dcc85c750aac16eb7205452384e89595afd10b496c788ff2cd8adb852251877ff13ae029698568545fa655712acd86879bfcb2837f4fea3875efabd166165691b9f6f8a033cd0e8deb94289ec6b12e97615740117f93042cb6f548515bb9b6881274a01d08bab615f42818c9fc9464428139af47", 0x96, 0x7}, {&(0x7f00000002c0)="267449827ce252c740dbf4a48783b4408f338e06e1261fff1c820a12896a15014842f2678d810a9ad37c0386c0a2a87798024513964789785f491bba0ba44aa9f98db51e47570ddf222bbb3b908d281d0d958e8088966930b3facdb75e73fa741fed7e66c6124ef1f50d19cc57df61075066a2282f85304e8a78179338490335986989291dafd45a8c6d3f71e716c722cdd038fe5cac5ceaaba1d0ceea4067bf0f95131b0739cd5814c3144e9b9885dec572d5d2efa9c3f0c2a893f7375564", 0xbf, 0x2}, {&(0x7f00000019c0)="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", 0x1000, 0x5}, {&(0x7f0000000100)="26a9c845cfe874ba94704fee78675848c9f3f463e20590bfb50be26a5ca376575e76503ab2100deeb144c883b70ab0171eb6c140fa5e2804f73057a9a43664a88989a6189c0444c6f9f92eca2b1a8f6538079f0a40445a7a7085c9657ad00695f59fe4d6", 0x64, 0x8}, {&(0x7f0000000380)="a71009475ce7018620189f3a926d01d18747ebf131c67bdff34e0e9b18692b481be41f5e58a3a540919894fbe56f8d18f3c72973b3bad72928587046f650b516c0c0994be0ffdd63f89b535b7cd3af5b02bf", 0x52, 0x6}]) setsockopt$inet6_tcp_TCP_REPAIR(r7, 0x6, 0x13, &(0x7f0000003a40)=0x1, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = dup(r13) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) getsockopt$inet_mreqn(r14, 0x0, 0x23, &(0x7f0000000040)={@local, @rand_addr, 0x0}, &(0x7f0000003b40)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000003b80)={'vxcan0\x00', r15}) ioctl$TCSETAW(r7, 0x5407, &(0x7f0000000000)={0x4, 0x1, 0xc0a4, 0x0, 0x9, 0x4, 0xf7, 0x26, 0x8, 0x80}) 19:16:48 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:48 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xee40) [ 858.002340] EXT4-fs (loop5): Unrecognized mount option "lż vļ5CusPj" or missing value [ 858.050983] EXT4-fs (loop5): failed to parse options in superblock: lż vļ5CusPj [ 858.071852] EXT4-fs (loop4): journaled quota format not specified [ 858.084861] EXT4-fs (loop5): Unrecognized mount option "lż vļ5CusPj" or missing value 19:16:48 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3b) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) syz_open_procfs(r3, &(0x7f0000000000)='statm\x00') [ 858.097170] EXT4-fs (loop4): failed to parse options in superblock: usrjquota=" 19:16:48 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 858.133453] EXT4-fs (loop4): journaled quota format not specified [ 858.194787] EXT4-fs (loop5): Unrecognized mount option "lż vļ5CusPj" or missing value [ 858.217108] EXT4-fs (loop5): failed to parse options in superblock: lż vļ5CusPj [ 858.229947] EXT4-fs (loop4): journaled quota format not specified 19:16:48 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r4, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2001000}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)={0x50, r5, 0x200, 0x70bd28, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfffffffb}, @IPVS_CMD_ATTR_DAEMON={0x18, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfffff801}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}, @IPVS_CMD_ATTR_DEST={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}]}, 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4041) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000380)=""/101, 0x65}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffffffffffcd9}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 858.244764] EXT4-fs (loop4): failed to parse options in superblock: usrjquota=" [ 858.266267] EXT4-fs (loop5): Unrecognized mount option "lż vļ5CusPj" or missing value [ 858.282457] EXT4-fs (loop4): journaled quota format not specified 19:16:48 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:48 executing program 4: r0 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r1) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000000)={[{@minixdf='minixdf', 0x22}], [{@measure='measure'}, {@subj_user={'subj_user', 0x3d, 'ext4\x00'}}, {@smackfshat={'smackfshat', 0x3d, 'ext4\x00'}}, {@uid_gt={'uid>', r1}}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 19:16:48 executing program 5: socket(0x1, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0xfecb) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f0000000000)={'broute\x00'}, &(0x7f0000000140)=0x78) setreuid(0x0, r2) r5 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r6) r7 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r8) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7ff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x3a, 0x400}], 0x40, &(0x7f0000000240)={[{@data_journal='data=journal', 0x22}], [{@obj_role={'obj_role', 0x3d, 'data=journal'}}, {@euid_eq={'euid', 0x3d, r2}}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x61, 0x222d820109f44f66, 0x39, 0x51, 0x30, 0x37, 0x35], 0x2d, [0x38, 0x30, 0x38, 0x63], 0x2d, [0x65, 0x38, 0x5, 0x62], 0x2d, [0x5d, 0x64, 0x0, 0x35], 0x2d, [0x36, 0x39, 0x34, 0x37, 0x62, 0x66, 0x35, 0x16e2fa8ec5e735d8]}}}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x32, 0x0, 0x36, 0x31, 0x31, 0xab, 0x4a], 0x2d, [0x36, 0x61, 0x0, 0x66], 0x2d, [0x65, 0x39, 0x30, 0x62], 0x2d, [0x31, 0x0, 0x62, 0x64], 0x2d, [0x62, 0x64, 0x31, 0x38, 0x62, 0x65, 0x39, 0x30]}}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', r6}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt={'uid>', r8}}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) 19:16:48 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$unix(0x1, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0xfeff, 0x6f, 0x20, 0x7}, {0x5, 0x7, 0x0, 0x40000}, {0x8, 0x0, 0x20, 0x4d}]}, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r3, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:48 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:48 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:48 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='T\xb9\xfa\x9d\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000002c0)=[{&(0x7f0000000000)="71cb7aea62490ae1889fc02a8098", 0xe, 0x2}, {&(0x7f0000000500)="840307be1571e63bf664dbbd9e520a6f5f898f34b497c301ec946fa16fe7d191d63b4f33c5cf4ad88ac0cd24c7e0ca697de8180d6665f96090f68de9580000a8855dfb47d29ef8bcee2beba82393ed06328830993419aaeac0cabb68329492a395646436464a492f24870f67b2035b9ce2e7283a2decd0af3c817c86adecc9c6ed0cd135aa", 0x85, 0x94}, {&(0x7f0000000400)="5921e7744b17a9fdb0b07059604af0f2d353d72f5e67c43d38212775a665d55f71dcf2aff265cd2ddda73907bd3029f64b2f06883328856e8fbc73d59737b3d0305cbf0fdbb12b2b3e64700709333f3de882fd3ea499fbe6b63deef58683581877bfcb5261353cea754594c85694e024e50bd3f1702b15d9cad05658944dc97af6c1fcf5ee64982d58f4876e78da41f6bd6ceccabb1ea706ea21f24e956fd7ea522fae1593a48502aad27188da961a15ea29e73cea7ff6dd416687793436cb30928bb93eed26f787d957652d95f924090d8a58bfa3df294e1a8ede21ffa6350030ed829dfb3c502412f7b3", 0xeb, 0x10000}, {&(0x7f00000005c0)="c05d019965cae41f99", 0xffffffb5, 0x5}, {&(0x7f0000000140)="f9d33074", 0x4, 0xa2}], 0x1022000, &(0x7f0000000340)=ANY=[@ANYBLOB="7573726a71756f74613d22001a00e3f47d35eacdcd9b5adf0797d719dec8ae83201033892e94ad247b19712b9df84eeab03a14f934443a32e524a2d07f7cc723878f8592cc6ab51c02001c8373c5ab320f594639ce44ea355e77bcc46369293d03f959e9d0c9ab9d33e5cf19dc6aace81c410ed63a626f28ca84ca280980a2f9825541120430f202954238d8638963ebefc35896130f743b99001ed80e0d2a59b6ff90ea5754cffb2bb1f280aa86c82d005b982509a40ba1412c"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:49 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:49 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="7585724d1dafda74613d2200"]) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='ns\x00') fcntl$getown(r1, 0x9) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) bind(r2, &(0x7f0000001180)=@nl=@unspec, 0x80) fchdir(r2) r3 = accept4(r2, &(0x7f00000015c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000001640)=0x80, 0x80000) recvfrom$inet(r3, &(0x7f0000001280)=""/53, 0x35, 0x40000000, &(0x7f0000001300)={0x2, 0x4e22, @rand_addr=0x2}, 0x10) ioctl$RTC_VL_CLR(r3, 0x7014) r4 = syz_genetlink_get_family_id$team(0x0) accept$packet(r1, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000700)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(r3, &(0x7f0000002c40)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0xa001a24}, 0xc, &(0x7f0000002c00)={&(0x7f00000002c0)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r4, @ANYBLOB="000225bd7000fbdbdf250200430008000100f11b06c72161a1d85db91980db559d32e916119a2fc8392646fd", @ANYRES32=r5, @ANYBLOB="04000200"], 0x20}, 0x1, 0x0, 0x0, 0x800}, 0x80) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) r7 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') getsockopt$inet_opts(r6, 0x0, 0x9, &(0x7f0000000380)=""/72, &(0x7f0000000580)=0x48) sendmsg$IPVS_CMD_GET_SERVICE(r6, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x810}, 0xc, &(0x7f0000000500)={&(0x7f0000000b40)=ANY=[@ANYPTR=&(0x7f0000000880)=ANY=[@ANYRES16, @ANYPTR=&(0x7f0000000b00)=ANY=[@ANYRES16=r1], @ANYRESOCT=r3, @ANYRESOCT, @ANYRESDEC, @ANYRESHEX], @ANYRES16=r7, @ANYBLOB="08002cbd7000fcdbdf25040000000800050003000000240001000c0007001b0000040200200014000300ac1414aa0000400000000000000000004000030008000e004000000014000200697026677265746170300077b20000000800080003000000080003000000000008000000e4000000000000000000000008182965eae6ec52"], 0x3}, 0x1, 0x0, 0x0, 0x20040000}, 0x80) sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x209}, 0xc, &(0x7f0000000200)={&(0x7f00000002c0)={0xfc, r7, 0x10, 0x70bd27, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3e}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e21}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x1}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}]}, @IPVS_CMD_ATTR_DEST={0x44, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x6}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}, @IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x9}, @IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xee88}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}]}, @IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@dev={0xac, 0x14, 0x14, 0x26}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x59}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x62}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x80}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x100400}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfff}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x5}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6_vti0\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x3}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}]}]}, 0xfc}, 0x1, 0x0, 0x0, 0x88c6}, 0x4000) r8 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='//a\xaeH=\xbe\xd5zt\xf7\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x2400, 0x65d) r9 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = dup(r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) r13 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') preadv(r13, &(0x7f0000000700), 0x31f, 0x10400003) r14 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r12, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r14, 0x400, 0x70bd2b, 0x25dfdbff, {}, [@TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}]}]}, 0x24}}, 0x8005) dup(r10) ioctl$FICLONE(r9, 0x40049409, r10) 19:16:49 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000002ac0)=[{&(0x7f0000000200)=""/255}, {&(0x7f0000000040)=""/31}, {&(0x7f0000000300)=""/173}, {&(0x7f0000000100)=""/20}, {&(0x7f00000019c0)=""/4096}, {&(0x7f00000029c0)=""/128}, {&(0x7f0000002a40)=""/122}], 0xe9) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$FIDEDUPERANGE(r4, 0xc0189436, &(0x7f00000003c0)={0x100000000, 0x5, 0x2, 0x0, 0x0, [{r2, 0x0, 0x2}, {r0, 0x0, 0x81}]}) 19:16:49 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) recvmmsg(r0, &(0x7f000000be80)=[{{&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000200)=""/150, 0x96}], 0x1, &(0x7f00000002c0)=""/233, 0xe9}, 0x3ff}, {{&(0x7f00000019c0)=@sco, 0x80, &(0x7f0000001c00)=[{&(0x7f00000003c0)=""/60, 0x3c}, {&(0x7f0000001a40)=""/185, 0xb9}, {&(0x7f0000001b00)=""/210, 0xd2}], 0x3, &(0x7f0000001c40)=""/182, 0xb6}, 0x57}, {{&(0x7f0000001d00)=@can, 0x80, &(0x7f0000001e80)=[{&(0x7f0000001d80)=""/193, 0xc1}], 0x1}, 0x8001}, {{0x0, 0x0, &(0x7f00000030c0)=[{&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/61, 0x3d}, {&(0x7f0000002f00)=""/44, 0x2c}, {&(0x7f0000002f40)=""/193, 0xc1}, {&(0x7f0000003040)=""/126, 0x7e}], 0x5, &(0x7f0000003140)=""/248, 0xf8}, 0x7}, {{&(0x7f0000003240)=@pppoe={0x18, 0x0, {0x0, @local}}, 0x80, &(0x7f0000004640)=[{&(0x7f00000032c0)=""/4096, 0x1000}, {&(0x7f00000042c0)=""/191, 0xbf}, {&(0x7f0000004380)=""/132, 0x84}, {&(0x7f0000004440)=""/82, 0x52}, {&(0x7f00000044c0)=""/1, 0x1}, {&(0x7f0000004500)=""/11, 0xb}, {&(0x7f0000004540)=""/184, 0xb8}, {&(0x7f0000004600)=""/57, 0x39}], 0x8, &(0x7f00000046c0)=""/252, 0xfc}, 0x10001}, {{&(0x7f00000047c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000005a00)=[{&(0x7f0000004840)=""/4096, 0x1000}, {&(0x7f0000005840)=""/230, 0xe6}, {&(0x7f0000005940)=""/186, 0xba}], 0x3, &(0x7f0000005a40)=""/27, 0x1b}, 0x5}, {{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000006d40)=[{&(0x7f0000005b00)=""/83, 0x53}, {&(0x7f0000005b80)=""/62, 0x3e}, {&(0x7f0000005bc0)=""/72, 0x48}, {&(0x7f0000005c40)=""/4096, 0x1000}, {&(0x7f0000006c40)=""/231, 0xe7}], 0x5, &(0x7f0000006dc0)=""/66, 0x42}, 0x9}, {{0x0, 0x0, &(0x7f0000008000)=[{&(0x7f0000006e40)=""/4096, 0x1000}, {&(0x7f0000007e40)=""/206, 0xce}, {&(0x7f0000007f40)=""/130, 0x82}], 0x3, &(0x7f0000008040)}, 0x2}, {{&(0x7f0000008080)=@nfc, 0x80, &(0x7f0000009780)=[{&(0x7f0000008100)=""/156, 0x9c}, {&(0x7f00000081c0)=""/202, 0xca}, {&(0x7f00000082c0)=""/200, 0xc8}, {&(0x7f00000083c0)=""/229, 0xe5}, {&(0x7f00000084c0)=""/4096, 0x1000}, {&(0x7f00000094c0)=""/158, 0x9e}, {&(0x7f0000009580)=""/238, 0xee}, {&(0x7f0000009680)=""/69, 0x45}, {&(0x7f0000009700)=""/111, 0x6f}], 0x9, &(0x7f0000009840)=""/84, 0x54}, 0x80000001}, {{&(0x7f00000098c0)=@ax25={{0x3, @netrom}, [@null, @default, @remote, @default, @rose, @netrom, @default, @netrom]}, 0x80, &(0x7f000000bd80)=[{&(0x7f0000009940)=""/71, 0x47}, {&(0x7f00000099c0)=""/243, 0xf3}, {&(0x7f0000009ac0)=""/143, 0x8f}, {&(0x7f0000009b80)=""/230, 0xe6}, {&(0x7f0000009c80)=""/4096, 0x1000}, {&(0x7f000000ac80)=""/223, 0xdf}, {&(0x7f000000ad80)=""/4096, 0x1000}], 0x7, &(0x7f000000be00)=""/70, 0x46}, 0x9}], 0xa, 0x2, &(0x7f000000c100)={0x77359400}) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f000000c140)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000000)=0x4059) readv(r3, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 858.964798] EXT4-fs (loop4): Unrecognized mount option "u…rMÆŚta="" or missing value [ 858.995939] EXT4-fs (loop4): failed to parse options in superblock: u…rMÆŚta=" 19:16:49 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 859.046434] EXT4-fs (loop4): Unrecognized mount option "u…rMÆŚta="" or missing value [ 859.158023] EXT4-fs (loop4): Unrecognized mount option "u…rMÆŚta="" or missing value [ 859.175119] EXT4-fs (loop4): failed to parse options in superblock: u…rMÆŚta=" 19:16:49 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x1) r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000040)='.\x00', 0xfe) r3 = inotify_init() r4 = inotify_add_watch(r3, &(0x7f0000000000)='.\x00', 0x80000000) inotify_rm_watch(r2, r4) inotify_rm_watch(r1, r4) r5 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r6, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 859.229414] EXT4-fs (loop4): Unrecognized mount option "u…rMÆŚta="" or missing value 19:16:49 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0470687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d1e02ffe63ba8863cd7dcc6760253ef", 0x3a, 0x100000400}], 0x880800, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 19:16:49 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:49 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000001ac0)=ANY=[@ANYBLOB="7573726a71756f74613d020007409b10aa1aec5e5e9de66b961087ad79cdb327c56230e197d814cf08b2b4d11e8f99a8b7b31189e78b681e8052a1f5187fc7fd229a84b4abcb78871f5f80a0f5a29ea562fe39566a2b6a029b3c835368d8c730e81aabb45d41c20e7cd083618c87111096aa386a59ba757b21e6f3c8710e136b0d9925c5b354c5e9af477c855c4d48306633189840fc7b8178696fa69fe9a95b775b8138cf5c3bd6e3933fa4daa26c5852b7289ad4ec5d702ba481ae2751fcfe97e6a1c444668168a76eaae7ee08fce2b78c205f683831ab56729f98efaeaf929f606b0a"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockopt$inet_mreq(r1, 0x0, 0x23, &(0x7f0000000140)={@dev, @empty}, &(0x7f00000002c0)=0x8) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000200)={0x1, 0x3, 0x1000, 0x16, &(0x7f0000000000)="6517758e58c8d0dffa6ccc1de7541d1912af1394b0f1", 0x6, 0x0, &(0x7f0000000040)="f88b1434800c"}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000300)={{{@in=@remote, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f0000000400)=0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000440)={@rand_addr="8f3e9373efa2c3f17f7f3fde58f6ec5f", @loopback, @local, 0x824, 0x5b, 0x4, 0x100, 0x8, 0x800000, r5}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000340)={@remote, @rand_addr, 0x0}, &(0x7f0000000700)=0xc) sendmmsg$inet(r10, &(0x7f0000002440)=[{{&(0x7f0000000100)={0x2, 0x4e22, @loopback}, 0x10, &(0x7f0000001a40)=[{&(0x7f0000000440)="f4f337b6b6db8f5b98c3fee0969fce56fd9fe6c807b9e84156aa0562d8b325515293e9e29887eb7aa9889f47c5a936bbee29c5629c0b79f3eb1ec092471e83144e4a3288abe73140dfbe3eff8f2e", 0x4e}, {0x0}, {&(0x7f0000000780)="9862618128fae4ddc89ba66b93884b5cb1a5761651b338e0312b637bf57a74006ef64033755b841e168f18fb671e456103bf6603968479d941cf032450233af235a7c7587ee3b87c1ba259cea65adebd4e1b8590364bc6ce82f1af11d195118676e5ff8a0feb09f67ea83266c488d1493be0833a23aa6c50ae4263727b04175b438d4134e97113b38570619ce19445cb8782f515357699311a2009972791f2899b05e08ba6007cc2996eb63964e70dce4c72dfa5f38a7fa9a7b571e1d277db922ebe713c86181ee61e32257eb81fb4a07dd6389e185ac85d7303f5141016d0d5a0e10a6bb88bced2d38d1d60aee1d4fbcc2d37645933", 0xf6}, {&(0x7f0000000880)="208edd5c9d4e6dc2213ef5b5321a39768a91b0987f42285231256062bf9ab234c53b8c349a41349e08507c7929665d3283be4d5e8e01607a177ee07b3a04bbd905b8dd5e0329be54efdd2795dea3fded901a36adfc0b6c32156605580d114c73527b372332e4fef20c79a261fadbc600a36acf95ed8a4b3c393d235f18bcafc15f8be762a4c7f522c0cae959f7d0558512c2", 0x92}, {&(0x7f0000000340)}, {&(0x7f0000000a40)="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", 0xfe0}], 0x6, &(0x7f0000001c40)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x3}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r11, @multicast2, @broadcast}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x9a}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @loopback}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r11, @multicast2, @loopback}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xff}}], 0xc0}}, {{0x0, 0x0, &(0x7f0000001f00)}}, {{&(0x7f0000001fc0)={0x2, 0x4e22, @local}, 0x10, &(0x7f0000002200)=[{&(0x7f0000002000)="0164bb1b3cee91d2d23fd07164e71a7801f5084d8bbddc585359319c5af5ff173d56777cbbacaf7a2230a3decfd93551c04a6802ecc89b510747e5a0a2386a08d8adcb6d093332537d945054cbe7622106975a139d6ea1d907c98abd45fd30b082028e3bbd7f4297240740d6e94e6b58f7c9702fed673cfc90a7d126ffefbb22168cda7311efeef208809a6d6f621c0fa2067af03ce38f8205e9988f461be9c70b7d59ff93ff09decf74a9e55430468f15e22cd1fd56879a2f20ab8f1fd80135e9ac1e61f7e87fd6", 0xc8}, {&(0x7f0000002100)="9ded0933fadacbada31ad7b75482074167847b16d8ccdde9b9012cb97c10a85ff942c8f98c1d075f7d5a3367a81d5afc07e162b62f982ed1e7a362fe41e53bcd5d8ddbe0886a755300da5f4ce107c1948f829061f5e99af66c0500003f3296206702616904a1dcba056f1854deba8c64262e5ced27d343", 0x77}, {&(0x7f0000002180)}], 0x3, &(0x7f0000000380)=ANY=[]}}, {{&(0x7f0000002280)={0x2, 0x4e24, @broadcast}, 0x10, &(0x7f0000002400)=[{&(0x7f00000022c0)="247badb355c651b14744280a13c3b8ffcb44beacbfe5f126189e667bcf69a0bc7cb25e2358332fb486915eec8cce7775876b447a45deb35e5b3f8c346e1b008cd8f583159970ca105cd1389d417e87c3383a2b893230e3635eb35502a705832a2d60d7a39dbac94ecca5ffd0da556dcef4ba376eb09519ad2820a60ff79f8a661d", 0x81}, {&(0x7f0000002380)="981176b1f9d40ffae09bf001311558ee3ee0", 0x12}, {&(0x7f0000002540)="7668884946f4985f31ce5a0698abbf12f91e08000000000000feb13b1ca910cb1b9902000000000000006752b125822dd71199ead39298707e7599088f7425077a19ab5b596178f9ab7a27d9cff7fee568927ca35f2a66eb1bd0bb885cc09569eaa8ba7eeeda3603aa8fdebe00d67ff3f2cc5782afbc805626299f0b42eb47f48f0e94404a", 0x85}], 0x3}}], 0x4, 0x140060c4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000340)={@remote, @rand_addr, 0x0}, &(0x7f0000000700)=0xc) sendmmsg$inet(r12, &(0x7f0000002440)=[{{&(0x7f0000000100)={0x2, 0x4e22, @loopback}, 0x10, &(0x7f0000001a40)=[{&(0x7f0000000440)="f4f337b6b6db8f5b98c3fee0969fce56fd9fe6c807b9e84156aa0562d8b325515293e9e29887eb7aa9889f47c5a936bbee29c5629c0b79f3eb1ec092471e83144e4a3288abe73140dfbe3eff8f2e", 0x4e}, {0x0}, {&(0x7f0000000780)="9862618128fae4ddc89ba66b93884b5cb1a5761651b338e0312b637bf57a74006ef64033755b841e168f18fb671e456103bf6603968479d941cf032450233af235a7c7587ee3b87c1ba259cea65adebd4e1b8590364bc6ce82f1af11d195118676e5ff8a0feb09f67ea83266c488d1493be0833a23aa6c50ae4263727b04175b438d4134e97113b38570619ce19445cb8782f515357699311a2009972791f2899b05e08ba6007cc2996eb63964e70dce4c72dfa5f38a7fa9a7b571e1d277db922ebe713c86181ee61e32257eb81fb4a07dd6389e185ac85d7303f5141016d0d5a0e10a6bb88bced2d38d1d60aee1d4fbcc2d37645933", 0xf6}, {&(0x7f0000000880)="208edd5c9d4e6dc2213ef5b5321a39768a91b0987f42285231256062bf9ab234c53b8c349a41349e08507c7929665d3283be4d5e8e01607a177ee07b3a04bbd905b8dd5e0329be54efdd2795dea3fded901a36adfc0b6c32156605580d114c73527b372332e4fef20c79a261fadbc600a36acf95ed8a4b3c393d235f18bcafc15f8be762a4c7f522c0cae959f7d0558512c2", 0x92}, {&(0x7f0000000340)}, {&(0x7f0000000a40)="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", 0xfe0}], 0x6, &(0x7f0000001c40)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x3}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r13, @multicast2, @broadcast}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x9a}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @loopback}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r13, @multicast2, @loopback}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xff}}], 0xc0}}, {{0x0, 0x0, &(0x7f0000001f00)}}, {{&(0x7f0000001fc0)={0x2, 0x4e22, @local}, 0x10, &(0x7f0000002200)=[{&(0x7f0000002000)="0164bb1b3cee91d2d23fd07164e71a7801f5084d8bbddc585359319c5af5ff173d56777cbbacaf7a2230a3decfd93551c04a6802ecc89b510747e5a0a2386a08d8adcb6d093332537d945054cbe7622106975a139d6ea1d907c98abd45fd30b082028e3bbd7f4297240740d6e94e6b58f7c9702fed673cfc90a7d126ffefbb22168cda7311efeef208809a6d6f621c0fa2067af03ce38f8205e9988f461be9c70b7d59ff93ff09decf74a9e55430468f15e22cd1fd56879a2f20ab8f1fd80135e9ac1e61f7e87fd6", 0xc8}, {&(0x7f0000002100)="9ded0933fadacbada31ad7b75482074167847b16d8ccdde9b9012cb97c10a85ff942c8f98c1d075f7d5a3367a81d5afc07e162b62f982ed1e7a362fe41e53bcd5d8ddbe0886a755300da5f4ce107c1948f829061f5e99af66c0500003f3296206702616904a1dcba056f1854deba8c64262e5ced27d343", 0x77}, {&(0x7f0000002180)}], 0x3, &(0x7f0000000380)=ANY=[]}}, {{&(0x7f0000002280)={0x2, 0x4e24, @broadcast}, 0x10, &(0x7f0000002400)=[{&(0x7f00000022c0)="247badb355c651b14744280a13c3b8ffcb44beacbfe5f126189e667bcf69a0bc7cb25e2358332fb486915eec8cce7775876b447a45deb35e5b3f8c346e1b008cd8f583159970ca105cd1389d417e87c3383a2b893230e3635eb35502a705832a2d60d7a39dbac94ecca5ffd0da556dcef4ba376eb09519ad2820a60ff79f8a661d", 0x81}, {&(0x7f0000002380)="981176b1f9d40ffae09bf001311558ee3ee0", 0x12}, {&(0x7f0000002540)="7668884946f4985f31ce5a0698abbf12f91e08000000000000feb13b1ca910cb1b9902000000000000006752b125822dd71199ead39298707e7599088f7425077a19ab5b596178f9ab7a27d9cff7fee568927ca35f2a66eb1bd0bb885cc09569eaa8ba7eeeda3603aa8fdebe00d67ff3f2cc5782afbc805626299f0b42eb47f48f0e94404a", 0x85}], 0x3}}], 0x4, 0x140060c4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000340)={@remote, @rand_addr, 0x0}, &(0x7f0000000700)=0xc) sendmmsg$inet(r14, &(0x7f0000002440)=[{{&(0x7f0000000100)={0x2, 0x4e22, @loopback}, 0x10, &(0x7f0000001a40)=[{&(0x7f0000000440)="f4f337b6b6db8f5b98c3fee0969fce56fd9fe6c807b9e84156aa0562d8b325515293e9e29887eb7aa9889f47c5a936bbee29c5629c0b79f3eb1ec092471e83144e4a3288abe73140dfbe3eff8f2e", 0x4e}, {0x0}, {&(0x7f0000000780)="9862618128fae4ddc89ba66b93884b5cb1a5761651b338e0312b637bf57a74006ef64033755b841e168f18fb671e456103bf6603968479d941cf032450233af235a7c7587ee3b87c1ba259cea65adebd4e1b8590364bc6ce82f1af11d195118676e5ff8a0feb09f67ea83266c488d1493be0833a23aa6c50ae4263727b04175b438d4134e97113b38570619ce19445cb8782f515357699311a2009972791f2899b05e08ba6007cc2996eb63964e70dce4c72dfa5f38a7fa9a7b571e1d277db922ebe713c86181ee61e32257eb81fb4a07dd6389e185ac85d7303f5141016d0d5a0e10a6bb88bced2d38d1d60aee1d4fbcc2d37645933", 0xf6}, {&(0x7f0000000880)="208edd5c9d4e6dc2213ef5b5321a39768a91b0987f42285231256062bf9ab234c53b8c349a41349e08507c7929665d3283be4d5e8e01607a177ee07b3a04bbd905b8dd5e0329be54efdd2795dea3fded901a36adfc0b6c32156605580d114c73527b372332e4fef20c79a261fadbc600a36acf95ed8a4b3c393d235f18bcafc15f8be762a4c7f522c0cae959f7d0558512c2", 0x92}, {&(0x7f0000000340)}, {&(0x7f0000000a40)="f354b9fa3b2988465ad6bfeaa237ab4f58e4744e82e5dd410d5d4152f9c042605f8c73129342780f355a533472b9c6098b46ad52c0147edadb826507aeef75029179ccb38dd04551e7f8e0eddf51d526f9899c31db90d03aa142b1fc2f16a6d85610ed3bbbe85245d1048a9775f80e6ea787564333a5432978c16ccc94f101d32877b019009271834dffa42c50f0dc7406684a307791a810440e4a6bbedefd321ea85b6b2fcb344128f9186f491ba6256539549f6083cfa2b52866eff508b68a4b1bac02bdafe035a371c32c160c62df6f45d5f5f4f94e9aee209f23a6f2aa01a42d9ef4e59cf4bcf60e91b0b17cef4c696811c05de8ed829f10d8f7b8b8f52f665aba92b0593f11d0bea23fbfe40f1d9e25691f0093379a92ce283b22c5698f4e4af1eef0e3e0b8070d00ab228eadcdac9bc6b035f35b35bff7b9df1cd55e8efead07773b190b4e2f609528f6a5ef9313c45c77591baf006e78cc703e4fec6b7ec27a4bc256cfaa8a442aa1aa7eefbc66691a20c8c1272ef1d31080d6ad3a193b760c4616a030184c1dfcdf3c7f2837129ad098ec3ec6e4f3d942146d301ede8e412ea58b1801d0a037a53980a3ab721a79d89dbdf8db9f5e0a35ad96aaf4e208c8c706580a52e85810db8579ee9efe7cf3dfb85a2216c1a7aa43fbe9d6714e53671e4e433ce0eae164ca6e09083cb17c05f0b19d59f31a4748f7fe7501e65c73d1643b5b823a82c801288410f4974eba2822b440cbc33a4a6b2415225c2a02c16dba01ae00d023747ae8e64be135f825f2b414b9467cbcc6f9711f0b6c979ac6ed183363b3d79208fed114d1217d6459b336cad9a9ecdd6054eacc3b09d7e3e8ccbe97a1e16109d62e626ea7e99f4450f310fc319f97dc08cb962361ecdf4e49da7cad6241d05d884508833a9cb6c560e9c8cc5a947b0b9ab125abcfb182b9b1df4e5d693290aeddd4c72166435718672a730a355b53a3125233d44f267b028307b59385103eaca3e9a2aba5a4199c695f0cfaac9c33caaac5dc70777bc2c7752d0ddf4acba663c04bd793ebc64b77b69e9895e0eb4c25f82ccf884d063a5a5ad871207dd19b1c135fb840191c274b96c771c4bf2b24efab2ef11d8dc77ee36a662ce063200066ac0e983b21853b99489662aefbfd9bbe43149d8fd9f5e3da25c3e79ab0ae0272ca57a9229cfab90003d7ad751c503677a3e0f689cdc751e4bf1346e72418bbbd9b0394a9b04b27750952ecbf2bd97cf3d8ff6a84341079ed8f41e100df11589fea0976b9b10fba8bea108ab1a1be768f5542242458982ab573676103e666e3aa6c2fda1c50bf45957e0d56a7781832fe26a944057152aed5dae27636600406dee73df4dd533ee3e26c9d287d54ad3f3080b46a7858e0bd541276a6229bddb47fe8a6a418f09fb2d46146c6fa1d10b09a3c036044c40aa5dab9e54324ade1bced5d9d654f2cf97955d432752f195871fa26490c4eeb0efe30145dcec9ce12137dff86b46a0b2cc6fbd74a1e87037ae1a811f009821293d38e0166e5a6eadbe77d230e82a79715a75fdf167584f4a3c84abbc1551f2482572dd2671309f856d2ff78cb65067d64160b0ee1c786b2e7530628c018b705da4de9e3c3539ac0fcfcf06ec1e5b56669099ee043559b475ccd1e985c28822649aa80780243ed6578507e8e2756f646d5fd8369aa323aadd34344ff56fb152527a22e623da5f889da22082d8918ebef1096fec9eadea7d5f7e10fa97e6055ca328d2cbce84b8abe250bc8758837a4150fa61e3dda4301b716e94f310d5274ca725863b4b0a32f2cadbf8d6e0324c6871b220d052cef787f0185ce3f9072b575a8fbfc5c89c5fb3f580414e4c8f4b2f304ab688f20577b6602ddbd42dbf72be5cef43c29e4296853a9dda2f3e884f5495d0a892d9afbc5913601dfaaf296cfadd27001375137f2568fbfdca973026f3c4bceedf4432bd2341d457e2e69e9f3cefc4781723bc22ba7b34eff14c1fc3a3c4074968045714e985cba40040b51beaa4a432e62c7dd064949cf9876427ec57ddf4aad5826785f3e9bf0f35f84b124be98babc96af9156526990df479300ac604d9dab804ffcd1d105cdfb07970e4cfc69fe2540abebbeb92e96cc182037126585bd783d479aec4935b5600a9aad903d40c419859fde29689ac0557f0c29a2331008d6710a571c485eace637b209951836f1fcef7b624f7d86df6c0c336ec6f4588a689a840719a87f8885c84e414d93b159bdde3643f2581b82c564e7f4e7ca98a35682f0de477903441aa5532d48ffee38c46f70bea9a74d235e7d0f42c3c826284533ad80504bc78ae626b6c1ed7d3a7be24bc30dfae4489b4505e2d4f52095f81ecb90c3c5a5895b5fef1d430ecd0fcf75fc65eb5c2a7fdadd4f87b2e9d451aa2344d84cd1a912938a59cb61a347d50c1c146b2f70b6119a69bfc48b2e88d5a3c99e5e36443ea56fb9a0604a0586ae36806ed4e9bccdcef63bbced4c75b60507de699546321a874d2f2940a35d5b1005367a8134006599b343876191f4663ac42dc3b7d98cfcacdfc0ac7b214fcad53e6b131603e1f66a67d96f509ef9a6af34bbe7cd2338465f9589eb6c8939f881854650e50fc63fb347fe0e00f2565c39cf97982237fa09416bb4d2b65bbe5923fb570626200af43991b21dca1ab46421fb3df05ee93eab2c1c63eff0c5b76bc42385cef8a8c0a950dc6eae1a69b5f229a30b03a23e73fcc206dd20fc0db9c314d22203f4f9166f822b4f4873128c6cd899fd10f82b7d932c5e84d0e65660bb4452e2757bcaa26169ee3dfd5c3a9def15c2015f403e648efb8fc8d3a8b8592bd05615046089ddf78ca5837a9c9a8746fb44b7c6e0228118880ffa470dacf6bffa336aa6469b907ce91fc371a705203da5bd5e5df3e1739b568d13c738854f8c20f75bdd550e2bf58d8b2654ac27829c6780beba10e7d5e6c4656f707e9d9a62a4d57566d28bdd66dd2cada9237fefbeb6f9c38debd259fbf4145298bb90309620535436764b9f95c997eac0fc598fcf62f96d615e426869a11fc965275f33ea561eebb953ad67c48b9928975eb6b910f52cbe0ad612513f31d5a5bcef68fc664be681414695978f7e876ac515e3d752666a5412e13c731ab39cd1a275bc127aa49c086dcea2d2cbb68adc9312a91f86e389858ff5cc156aeb4f14f4bf4ab8d86bf80dc56c3a23ac294094aba79ed8ef24ee21a6c7252e6653ec95a1bdab68971671411db13c4d01f3665e81f9f680476a1e7842f21845a21073798ed34b4df54ac2d2ca8d64978436bf4dd852670e2530e995b9139a4cd164462c869fb2ae31d3e7ef93a4ccb4a3dcff225dbcf354a069823e0aad04a664b40c55ee4c80daffc4ed7444c2eb38f2af379bb329aff66a5a4e170b0f02484c74894366e14b23640dcd0d83653f38d3d17a8f1a032005e21f1105b9dc8cf4c75a1484952197af3b963c7da3199c5105862fe3a5af46c43635e37ea379419ed8fa325a2121d43dfa4ebd717b32ec30acac65ba9cbd2a213376e28d67570c4dffe71a7acc58ca14e3aa68587e38b67565475afe2f5e743ce17b76fbb004e037e5b2076190b86161edc146f1169fde94b192a23509b44917403013813a482fcf7960773644d85ab2c5994c93f40d957aaf914d71d5c9713a63b84c211209f1f29313ff92f690ac93de7b46edf542f192d977e7c0c92126f8a9768badcfb525e53cb3d747300ab3b34ed3d42885a63d808f84777dfdf46dbe80bd234a682535878e80c2fed439793c1662b52c6c1a3bf7d6d89bdef08e64e88be5cc871d6a3a26fc3941eb0db79e82a9b89478d745b9f3d1f408bea8141156653559c9697672974519d9c89e36dfdce5898919f5ef19d6686fe5f2567bb0a39ff4bb1fd0bd9b55d2cb76cbe2fbf0147752629be014bfd1d89810b2d88212db0a1068722e9089f5a73bec16ee975bda88c8fdb842469b70b56c1dcc777490b3c8581659d35213f8484e6445aac5c6c4bcdd39814fdc1bfa86043c0b49eef7e1964e1fdc89c0220065ffa5423120824aa55cc6118e4d2c9e1bd4a7aa3a94699bb7cd9decb51b7057e5c60c887e7489bd0e1ab7a85f0b0327d8a3115941268bfa1d6d4c161b9eecdf9103fd055148426308428fedd7ccbdb9be4ece9a513c489e6cfff76e4006660d5c1c04227da23c96bb72d45f2bea1fde02fc5b9fa8000b3eec2cf69f25dceb1ea7de49f70b29ef101a53aa9d8c54ae65467db58df24e2c4a3734a09528f838654bf2b34bd4a19f15b06c023e840ff66e274c5a90cf0201d33489571b786d09872ced1da5d470314d71468d0c8ccbe28e7cd71e92c6345c91106b47a13283e4736ae8c63fee4bb18b0185ca918cbf83bfa5ad090002d4e7fa3b9e6aa0d85c2a1ae2a07f08641302db8bffa69d153f368847bffdd5a0a65c63c51c5877156f841250223538639bf6565dfebfb48c94b021ea88fb153cc88bcaee219bf1f18fdb7d8750d956319bd950946a004023b0189b70df74d3cfc283a61b5564a2f6c9bf50cdbde1c42afdcf261ab2ededb13199408443ddcd43a39be60c4620a31551d05c91da448ba95bb45a12c0557c46625d7aa21e5c47eb78e76fcd3d9d12c3c1dc3de6097b89c66c8b43aded600daf64f00e3de6d0a3d939892afa7cf41fa9bf36f3a7683868476e85ab8bc9012e613160db7b34abc5bae5c79782ca0ff683ff6228a8559fbdc8a611411a99853c914b5a4ce350db1dba9fee5080bca59a4f2715568b1b79ebfcf3e95e4c9e394bb5982e02b2f353588b76ee0cebf472d52e9e34dec433d6ec6dfc81e52cc3d59abdb1df3a7f6eefacacf34fbeaf735792069f8cf8704ecda5db038d48a727a3ebcd0c8a6182c35b2244297c6f9eb446890146b17e9a1621a6f3510c2902e267f2f02367db2474681b58949987f3b79fa30821887e0690cc5b41cd61aa00c3ef7faf1878a9ffa33385b23456d1c75ed7701a3242ee7da024ad902edcf0b25d2b75df807b9b8bb4a3ccc60e0bf743a45ca01416714c2b42094d4616cf459dcfdb1f0ac99d39f00207e06853ac71d88268270b4c5007b9c52bb6eea9f5e2ea2c689c4b3265a9a55de2910cf5f14875bb2fae35c9b1a53f969cafbe59b49ebd82fb2aaa46953ca2e6ab48edfdc61de8a3b9b2b8be1f5af0d09927c8bdc35f537900ffa0112db1b5e2c59d20c98d91517365071ea1244a2246addef85d7f50447905e3528a5f31a6794ed07ac2fdc8e611c87b48f8276c0201ccbf364705086f45515bc838cff83d98ebc24c50b5d2465a597c627435b8fe5aadcbb74febf685b26b2c37b943720601a50923cd974fcc9cb5e00e8a96fff9d9f965218c85eb3bc89ffa2133ceb2cdf274f37013d4f8451600223f9ed048596d78ceca953525aa31910dd1ad56f58f080f4cf1e1fcdb8cbd72f071da262e13358eb13c1cadbf322dffae8968c7f325150c172fd619c320883f2b5d286f4cb221e7a9fd97389e35d6c8de1225d8ee8c0f3a76e94784af1bb2a2a5e9e03a3ca5db4ef2b672a952e6e9d21ae3189a9b8e9c95530c8f55462a636f83ff0239d50754a08e43320aa82bd6b0f75378ee089afd63687de6aeff0de914550a67e0ea4d1f644ac363214966205d7d1476fada60555957352454f0fce11a80fafd16932b148458bece36e1961bf5162d41afb526ed0659bf060d9a6add4572ccc4b2b4c1d4a7800cb0163f776f8883", 0xfe0}], 0x6, &(0x7f0000001c40)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x3}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r15, @empty, @broadcast}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x9a}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @loopback}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r15, @multicast2, @loopback}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xff}}], 0xc0}}, {{0x0, 0x0, &(0x7f0000001f00)}}, {{&(0x7f0000001fc0)={0x2, 0x4e22, @local}, 0x10, &(0x7f0000002200)=[{&(0x7f0000002000)="0164bb1b3cee91d2d23fd07164e71a7801f5084d8bbddc585359319c5af5ff173d56777cbbacaf7a2230a3decfd93551c04a6802ecc89b510747e5a0a2386a08d8adcb6d093332537d945054cbe7622106975a139d6ea1d907c98abd45fd30b082028e3bbd7f4297240740d6e94e6b58f7c9702fed673cfc90a7d126ffefbb22168cda7311efeef208809a6d6f621c0fa2067af03ce38f8205e9988f461be9c70b7d59ff93ff09decf74a9e55430468f15e22cd1fd56879a2f20ab8f1fd80135e9ac1e61f7e87fd6", 0xc8}, {&(0x7f0000002100)="9ded0933fadacbada31ad7b75482074167847b16d8ccdde9b9012cb97c10a85ff942c8f98c1d075f7d5a3367a81d5afc07e162b62f982ed1e7a362fe41e53bcd5d8ddbe0886a755300da5f4ce107c1948f829061f5e99af66c0500003f3296206702616904a1dcba056f1854deba8c64262e5ced27d343", 0x77}, {&(0x7f0000002180)}], 0x3, &(0x7f0000000380)=ANY=[]}}, {{&(0x7f0000002280)={0x2, 0x4e24, @broadcast}, 0x10, &(0x7f0000002400)=[{&(0x7f00000022c0)="247badb355c651b14744280a13c3b8ffcb44beacbfe5f126189e667bcf69a0bc7cb25e2358332fb486915eec8cce7775876b447a45deb35e5b3f8c346e1b008cd8f583159970ca105cd1389d417e87c3383a2b893230e3635eb35502a705832a2d60d7a39dbac94ecca5ffd0da556dcef4ba376eb09519ad2820a60ff79f8a661d", 0x81}, {&(0x7f0000002380)="981176b1f9d40ffae09bf001311558ee3ee0", 0x12}, {&(0x7f0000002540)="7668884946f4985f31ce5a0698abbf12f91e08000000000000feb13b1ca910cb1b9902000000000000006752b125822dd71199ead39298707e7599088f7425077a19ab5b596178f9ab7a27d9cff7fee568927ca35f2a66eb1bd0bb885cc09569eaa8ba7eeeda3603aa8fdebe00d67ff3f2cc5782afbc805626299f0b42eb47f48f0e94404a", 0x85}], 0x3}}], 0x4, 0x140060c4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000340)={@remote, @rand_addr, 0x0}, &(0x7f0000000700)=0xc) sendmmsg$inet(r16, &(0x7f0000002440)=[{{&(0x7f0000000100)={0x2, 0x4e22, @loopback}, 0x10, &(0x7f0000001a40)=[{&(0x7f0000000440)="f4f337b6b6db8f5b98c3fee0969fce56fd9fe6c807b9e84156aa0562d8b325515293e9e29887eb7aa9889f47c5a936bbee29c5629c0b79f3eb1ec092471e83144e4a3288abe73140dfbe3eff8f2e", 0x4e}, {0x0}, {&(0x7f0000000780)="9862618128fae4ddc89ba66b93884b5cb1a5761651b338e0312b637bf57a74006ef64033755b841e168f18fb671e456103bf6603968479d941cf032450233af235a7c7587ee3b87c1ba259cea65adebd4e1b8590364bc6ce82f1af11d195118676e5ff8a0feb09f67ea83266c488d1493be0833a23aa6c50ae4263727b04175b438d4134e97113b38570619ce19445cb8782f515357699311a2009972791f2899b05e08ba6007cc2996eb63964e70dce4c72dfa5f38a7fa9a7b571e1d277db922ebe713c86181ee61e32257eb81fb4a07dd6389e185ac85d7303f5141016d0d5a0e10a6bb88bced2d38d1d60aee1d4fbcc2d37645933", 0xf6}, {&(0x7f0000000880)="208edd5c9d4e6dc2213ef5b5321a39768a91b0987f42285231256062bf9ab234c53b8c349a41349e08507c7929665d3283be4d5e8e01607a177ee07b3a04bbd905b8dd5e0329be54efdd2795dea3fded901a36adfc0b6c32156605580d114c73527b372332e4fef20c79a261fadbc600a36acf95ed8a4b3c393d235f18bcafc15f8be762a4c7f522c0cae959f7d0558512c2", 0x92}, {&(0x7f0000000340)}, {&(0x7f0000000a40)="f354b9fa3b2988465ad6bfeaa237ab4f58e4744e82e5dd410d5d4152f9c042605f8c73129342780f355a533472b9c6098b46ad52c0147edadb826507aeef75029179ccb38dd04551e7f8e0eddf51d526f9899c31db90d03aa142b1fc2f16a6d85610ed3bbbe85245d1048a9775f80e6ea787564333a5432978c16ccc94f101d32877b019009271834dffa42c50f0dc7406684a307791a810440e4a6bbedefd321ea85b6b2fcb344128f9186f491ba6256539549f6083cfa2b52866eff508b68a4b1bac02bdafe035a371c32c160c62df6f45d5f5f4f94e9aee209f23a6f2aa01a42d9ef4e59cf4bcf60e91b0b17cef4c696811c05de8ed829f10d8f7b8b8f52f665aba92b0593f11d0bea23fbfe40f1d9e25691f0093379a92ce283b22c5698f4e4af1eef0e3e0b8070d00ab228eadcdac9bc6b035f35b35bff7b9df1cd55e8efead07773b190b4e2f609528f6a5ef9313c45c77591baf006e78cc703e4fec6b7ec27a4bc256cfaa8a442aa1aa7eefbc66691a20c8c1272ef1d31080d6ad3a193b760c4616a030184c1dfcdf3c7f2837129ad098ec3ec6e4f3d942146d301ede8e412ea58b1801d0a037a53980a3ab721a79d89dbdf8db9f5e0a35ad96aaf4e208c8c706580a52e85810db8579ee9efe7cf3dfb85a2216c1a7aa43fbe9d6714e53671e4e433ce0eae164ca6e09083cb17c05f0b19d59f31a4748f7fe7501e65c73d1643b5b823a82c801288410f4974eba2822b440cbc33a4a6b2415225c2a02c16dba01ae00d023747ae8e64be135f825f2b414b9467cbcc6f9711f0b6c979ac6ed183363b3d79208fed114d1217d6459b336cad9a9ecdd6054eacc3b09d7e3e8ccbe97a1e16109d62e626ea7e99f4450f310fc319f97dc08cb962361ecdf4e49da7cad6241d05d884508833a9cb6c560e9c8cc5a947b0b9ab125abcfb182b9b1df4e5d693290aeddd4c72166435718672a730a355b53a3125233d44f267b028307b59385103eaca3e9a2aba5a4199c695f0cfaac9c33caaac5dc70777bc2c7752d0ddf4acba663c04bd793ebc64b77b69e9895e0eb4c25f82ccf884d063a5a5ad871207dd19b1c135fb840191c274b96c771c4bf2b24efab2ef11d8dc77ee36a662ce063200066ac0e983b21853b99489662aefbfd9bbe43149d8fd9f5e3da25c3e79ab0ae0272ca57a9229cfab90003d7ad751c503677a3e0f689cdc751e4bf1346e72418bbbd9b0394a9b04b27750952ecbf2bd97cf3d8ff6a84341079ed8f41e100df11589fea0976b9b10fba8bea108ab1a1be768f5542242458982ab573676103e666e3aa6c2fda1c50bf45957e0d56a7781832fe26a944057152aed5dae27636600406dee73df4dd533ee3e26c9d287d54ad3f3080b46a7858e0bd541276a6229bddb47fe8a6a418f09fb2d46146c6fa1d10b09a3c036044c40aa5dab9e54324ade1bced5d9d654f2cf97955d432752f195871fa26490c4eeb0efe30145dcec9ce12137dff86b46a0b2cc6fbd74a1e87037ae1a811f009821293d38e0166e5a6eadbe77d230e82a79715a75fdf167584f4a3c84abbc1551f2482572dd2671309f856d2ff78cb65067d64160b0ee1c786b2e7530628c018b705da4de9e3c3539ac0fcfcf06ec1e5b56669099ee043559b475ccd1e985c28822649aa80780243ed6578507e8e2756f646d5fd8369aa323aadd34344ff56fb152527a22e623da5f889da22082d8918ebef1096fec9eadea7d5f7e10fa97e6055ca328d2cbce84b8abe250bc8758837a4150fa61e3dda4301b716e94f310d5274ca725863b4b0a32f2cadbf8d6e0324c6871b220d052cef787f0185ce3f9072b575a8fbfc5c89c5fb3f580414e4c8f4b2f304ab688f20577b6602ddbd42dbf72be5cef43c29e4296853a9dda2f3e884f5495d0a892d9afbc5913601dfaaf296cfadd27001375137f2568fbfdca973026f3c4bceedf4432bd2341d457e2e69e9f3cefc4781723bc22ba7b34eff14c1fc3a3c4074968045714e985cba40040b51beaa4a432e62c7dd064949cf9876427ec57ddf4aad5826785f3e9bf0f35f84b124be98babc96af9156526990df479300ac604d9dab804ffcd1d105cdfb07970e4cfc69fe2540abebbeb92e96cc182037126585bd783d479aec4935b5600a9aad903d40c419859fde29689ac0557f0c29a2331008d6710a571c485eace637b209951836f1fcef7b624f7d86df6c0c336ec6f4588a689a840719a87f8885c84e414d93b159bdde3643f2581b82c564e7f4e7ca98a35682f0de477903441aa5532d48ffee38c46f70bea9a74d235e7d0f42c3c826284533ad80504bc78ae626b6c1ed7d3a7be24bc30dfae4489b4505e2d4f52095f81ecb90c3c5a5895b5fef1d430ecd0fcf75fc65eb5c2a7fdadd4f87b2e9d451aa2344d84cd1a912938a59cb61a347d50c1c146b2f70b6119a69bfc48b2e88d5a3c99e5e36443ea56fb9a0604a0586ae36806ed4e9bccdcef63bbced4c75b60507de699546321a874d2f2940a35d5b1005367a8134006599b343876191f4663ac42dc3b7d98cfcacdfc0ac7b214fcad53e6b131603e1f66a67d96f509ef9a6af34bbe7cd2338465f9589eb6c8939f881854650e50fc63fb347fe0e00f2565c39cf97982237fa09416bb4d2b65bbe5923fb570626200af43991b21dca1ab46421fb3df05ee93eab2c1c63eff0c5b76bc42385cef8a8c0a950dc6eae1a69b5f229a30b03a23e73fcc206dd20fc0db9c314d22203f4f9166f822b4f4873128c6cd899fd10f82b7d932c5e84d0e65660bb4452e2757bcaa26169ee3dfd5c3a9def15c2015f403e648efb8fc8d3a8b8592bd05615046089ddf78ca5837a9c9a8746fb44b7c6e0228118880ffa470dacf6bffa336aa6469b907ce91fc371a705203da5bd5e5df3e1739b568d13c738854f8c20f75bdd550e2bf58d8b2654ac27829c6780beba10e7d5e6c4656f707e9d9a62a4d57566d28bdd66dd2cada9237fefbeb6f9c38debd259fbf4145298bb90309620535436764b9f95c997eac0fc598fcf62f96d615e426869a11fc965275f33ea561eebb953ad67c48b9928975eb6b910f52cbe0ad612513f31d5a5bcef68fc664be681414695978f7e876ac515e3d752666a5412e13c731ab39cd1a275bc127aa49c086dcea2d2cbb68adc9312a91f86e389858ff5cc156aeb4f14f4bf4ab8d86bf80dc56c3a23ac294094aba79ed8ef24ee21a6c7252e6653ec95a1bdab68971671411db13c4d01f3665e81f9f680476a1e7842f21845a21073798ed34b4df54ac2d2ca8d64978436bf4dd852670e2530e995b9139a4cd164462c869fb2ae31d3e7ef93a4ccb4a3dcff225dbcf354a069823e0aad04a664b40c55ee4c80daffc4ed7444c2eb38f2af379bb329aff66a5a4e170b0f02484c74894366e14b23640dcd0d83653f38d3d17a8f1a032005e21f1105b9dc8cf4c75a1484952197af3b963c7da3199c5105862fe3a5af46c43635e37ea379419ed8fa325a2121d43dfa4ebd717b32ec30acac65ba9cbd2a213376e28d67570c4dffe71a7acc58ca14e3aa68587e38b67565475afe2f5e743ce17b76fbb004e037e5b2076190b86161edc146f1169fde94b192a23509b44917403013813a482fcf7960773644d85ab2c5994c93f40d957aaf914d71d5c9713a63b84c211209f1f29313ff92f690ac93de7b46edf542f192d977e7c0c92126f8a9768badcfb525e53cb3d747300ab3b34ed3d42885a63d808f84777dfdf46dbe80bd234a682535878e80c2fed439793c1662b52c6c1a3bf7d6d89bdef08e64e88be5cc871d6a3a26fc3941eb0db79e82a9b89478d745b9f3d1f408bea8141156653559c9697672974519d9c89e36dfdce5898919f5ef19d6686fe5f2567bb0a39ff4bb1fd0bd9b55d2cb76cbe2fbf0147752629be014bfd1d89810b2d88212db0a1068722e9089f5a73bec16ee975bda88c8fdb842469b70b56c1dcc777490b3c8581659d35213f8484e6445aac5c6c4bcdd39814fdc1bfa86043c0b49eef7e1964e1fdc89c0220065ffa5423120824aa55cc6118e4d2c9e1bd4a7aa3a94699bb7cd9decb51b7057e5c60c887e7489bd0e1ab7a85f0b0327d8a3115941268bfa1d6d4c161b9eecdf9103fd055148426308428fedd7ccbdb9be4ece9a513c489e6cfff76e4006660d5c1c04227da23c96bb72d45f2bea1fde02fc5b9fa8000b3eec2cf69f25dceb1ea7de49f70b29ef101a53aa9d8c54ae65467db58df24e2c4a3734a09528f838654bf2b34bd4a19f15b06c023e840ff66e274c5a90cf0201d33489571b786d09872ced1da5d470314d71468d0c8ccbe28e7cd71e92c6345c91106b47a13283e4736ae8c63fee4bb18b0185ca918cbf83bfa5ad090002d4e7fa3b9e6aa0d85c2a1ae2a07f08641302db8bffa69d153f368847bffdd5a0a65c63c51c5877156f841250223538639bf6565dfebfb48c94b021ea88fb153cc88bcaee219bf1f18fdb7d8750d956319bd950946a004023b0189b70df74d3cfc283a61b5564a2f6c9bf50cdbde1c42afdcf261ab2ededb13199408443ddcd43a39be60c4620a31551d05c91da448ba95bb45a12c0557c46625d7aa21e5c47eb78e76fcd3d9d12c3c1dc3de6097b89c66c8b43aded600daf64f00e3de6d0a3d939892afa7cf41fa9bf36f3a7683868476e85ab8bc9012e613160db7b34abc5bae5c79782ca0ff683ff6228a8559fbdc8a611411a99853c914b5a4ce350db1dba9fee5080bca59a4f2715568b1b79ebfcf3e95e4c9e394bb5982e02b2f353588b76ee0cebf472d52e9e34dec433d6ec6dfc81e52cc3d59abdb1df3a7f6eefacacf34fbeaf735792069f8cf8704ecda5db038d48a727a3ebcd0c8a6182c35b2244297c6f9eb446890146b17e9a1621a6f3510c2902e267f2f02367db2474681b58949987f3b79fa30821887e0690cc5b41cd61aa00c3ef7faf1878a9ffa33385b23456d1c75ed7701a3242ee7da024ad902edcf0b25d2b75df807b9b8bb4a3ccc60e0bf743a45ca01416714c2b42094d4616cf459dcfdb1f0ac99d39f00207e06853ac71d88268270b4c5007b9c52bb6eea9f5e2ea2c689c4b3265a9a55de2910cf5f14875bb2fae35c9b1a53f969cafbe59b49ebd82fb2aaa46953ca2e6ab48edfdc61de8a3b9b2b8be1f5af0d09927c8bdc35f537900ffa0112db1b5e2c59d20c98d91517365071ea1244a2246addef85d7f50447905e3528a5f31a6794ed07ac2fdc8e611c87b48f8276c0201ccbf364705086f45515bc838cff83d98ebc24c50b5d2465a597c627435b8fe5aadcbb74febf685b26b2c37b943720601a50923cd974fcc9cb5e00e8a96fff9d9f965218c85eb3bc89ffa2133ceb2cdf274f37013d4f8451600223f9ed048596d78ceca953525aa31910dd1ad56f58f080f4cf1e1fcdb8cbd72f071da262e13358eb13c1cadbf322dffae8968c7f325150c172fd619c320883f2b5d286f4cb221e7a9fd97389e35d6c8de1225d8ee8c0f3a76e94784af1bb2a2a5e9e03a3ca5db4ef2b672a952e6e9d21ae3189a9b8e9c95530c8f55462a636f83ff0239d50754a08e43320aa82bd6b0f75378ee089afd63687de6aeff0de914550a67e0ea4d1f644ac363214966205d7d1476fada60555957352454f0fce11a80fafd16932b148458bece36e1961bf5162d41afb526ed0659bf060d9a6add4572ccc4b2b4c1d4a7800cb0163f776f8883", 0xfe0}], 0x6, &(0x7f0000001c40)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x3}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r17, @multicast2, @broadcast}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x9a}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @loopback}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r17, @multicast2, @loopback}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xff}}], 0xc0}}, {{0x0, 0x0, &(0x7f0000001f00)}}, {{&(0x7f0000001fc0)={0x2, 0x4e22, @local}, 0x10, &(0x7f0000002200)=[{&(0x7f0000002000)="0164bb1b3cee91d2d23fd07164e71a7801f5084d8bbddc585359319c5af5ff173d56777cbbacaf7a2230a3decfd93551c04a6802ecc89b510747e5a0a2386a08d8adcb6d093332537d945054cbe7622106975a139d6ea1d907c98abd45fd30b082028e3bbd7f4297240740d6e94e6b58f7c9702fed673cfc90a7d126ffefbb22168cda7311efeef208809a6d6f621c0fa2067af03ce38f8205e9988f461be9c70b7d59ff93ff09decf74a9e55430468f15e22cd1fd56879a2f20ab8f1fd80135e9ac1e61f7e87fd6", 0xc8}, {&(0x7f0000002100)="9ded0933fadacbada31ad7b75482074167847b16d8ccdde9b9012cb97c10a85ff942c8f98c1d075f7d5a3367a81d5afc07e162b62f982ed1e7a362fe41e53bcd5d8ddbe0886a755300da5f4ce107c1948f829061f5e99af66c0500003f3296206702616904a1dcba056f1854deba8c64262e5ced27d343", 0x77}, {&(0x7f0000002180)}], 0x3, &(0x7f0000000380)=ANY=[]}}, {{&(0x7f0000002280)={0x2, 0x4e24, @broadcast}, 0x10, &(0x7f0000002400)=[{&(0x7f00000022c0)="247badb355c651b14744280a13c3b8ffcb44beacbfe5f126189e667bcf69a0bc7cb25e2358332fb486915eec8cce7775876b447a45deb35e5b3f8c346e1b008cd8f583159970ca105cd1389d417e87c3383a2b893230e3635eb35502a705832a2d60d7a39dbac94ecca5ffd0da556dcef4ba376eb09519ad2820a60ff79f8a661d", 0x81}, {&(0x7f0000002380)="981176b1f9d40ffae09bf001311558ee3ee0", 0x12}, {&(0x7f0000002540)="7668884946f4985f31ce5a0698abbf12f91e08000000000000feb13b1ca910cb1b9902000000000000006752b125822dd71199ead39298707e7599088f7425077a19ab5b596178f9ab7a27d9cff7fee568927ca35f2a66eb1bd0bb885cc09569eaa8ba7eeeda3603aa8fdebe00d67ff3f2cc5782afbc805626299f0b42eb47f48f0e94404a", 0x85}], 0x3}}], 0x4, 0x140060c4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r19 = dup(r18) ioctl$PERF_EVENT_IOC_ENABLE(r19, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000f40)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000f00)={&(0x7f0000000c00)=@dellink={0x2c4, 0x11, 0x400, 0x70bd28, 0x25dfdbfc, {0x0, 0x0, 0x0, r5, 0x200}, [@IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0xfffffff9}, @IFLA_XDP={0x258, 0x2b, [@IFLA_XDP_FD={0x74, 0x1, {0x10, 0xa, &(0x7f0000000500)=@raw=[@alu={0x7, 0x0, 0xd, 0x8, 0x5, 0x70, 0x1}, @exit, @map_val={0x18, 0x8, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0x5}, @call={0x85, 0x0, 0x0, 0x3c}, @ldst={0x0, 0x0, 0x0, 0x2, 0x9, 0xfffffffffffffff8, 0xffffffffffffffff}, @map={0x18, 0x0, 0x1, 0x0, r7}, @map_val={0x18, 0x9, 0x2, 0x0, r9, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000580)='syzkaller\x00', 0x2, 0x6b, &(0x7f00000005c0)=""/107, 0x41000, 0x1, [], r11, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0x8, 0x1, 0x40}, 0x10}}, @IFLA_XDP_FD={0x74, 0x1, {0x18, 0x5, &(0x7f00000006c0)=@raw=[@call={0x85, 0x0, 0x0, 0x3}, @call={0x85, 0x0, 0x0, 0x59}, @exit, @alu={0x4, 0x1, 0xc, 0x9, 0x1, 0xc, 0x1}, @call={0x85, 0x0, 0x0, 0x2a}], &(0x7f0000000700)='syzkaller\x00', 0xffffff00, 0x1f, &(0x7f0000000740)=""/31, 0x40f00, 0x7, [], r13, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x8, 0x1}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0xa, 0x0, 0x3}, 0x10}}, @IFLA_XDP_FLAGS={0x8, 0x3, 0x8}, @IFLA_XDP_FD={0x74, 0x1, {0x13, 0x4, &(0x7f0000000800)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, @map_val={0x18, 0x0, 0x2, 0x0, r4}], &(0x7f0000000840)='syzkaller\x00', 0x3f, 0x0, 0x0, 0x80000, 0x6, [], r15, 0x9648f663361dd356, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x0, 0x10, 0x1, 0x5217}, 0x10}}, @IFLA_XDP_FD={0x74, 0x1, {0x8, 0xb, &(0x7f0000000900)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x800000}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1}, @map_val={0x18, 0xb, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x34}, @ldst={0x2, 0x2, 0xb2c3cb449f0f9316, 0x4, 0x479fc8d960fb0fed, 0x66b6e422bfd10f52, 0xfffffffffffffffc}, @alu={0x7, 0x0, 0x91ddbf76e02c87e, 0x5, 0x4, 0xffffffffffffffff, 0x10}]}, &(0x7f0000000980)='GPL\x00', 0x9, 0x1a, &(0x7f00000009c0)=""/26, 0x40f00, 0x4, [], r17, 0xb, 0xffffffffffffffff, 0x8, &(0x7f0000000a00)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000a40)={0x4, 0xf, 0x7ff, 0x8}, 0x10}}, @IFLA_XDP_FD={0x74, 0x1, {0x72964540281f9f89, 0x5, &(0x7f0000000a80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x5}, [@alu={0x2, 0x1, 0xb, 0x8, 0x2, 0xfffffffffffffffc, 0x7fffffffffffffea}, @generic={0x3, 0x1, 0x3, 0x3ff, 0xd527}]}, &(0x7f0000000ac0)='syzkaller\x00', 0x1, 0x76, &(0x7f0000000b00)=""/118, 0x41000, 0x2, [], r5, 0x13, r19, 0x8, &(0x7f0000000b80)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000bc0)={0x3, 0x8, 0x5, 0x8}, 0x10}}, @IFLA_XDP_FLAGS={0x8, 0x3, 0x4}]}, @IFLA_PHYS_PORT_ID={0x14, 0x22, "2129a91e587123f9ed140f8cbc"}, @IFLA_GROUP={0x8, 0x1b, 0xb701}, @IFLA_VF_PORTS={0x24, 0x18, [{0x20, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "22f6c7e78361a52a26e6c1763989bf84"}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x3}]}]}, @IFLA_IFALIASn={0x4}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x8000}, 0xd1) 19:16:49 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:49 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="5d73726a71756f746105783334c8c43d2200"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) timerfd_create(0x3, 0x800) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 859.534293] EXT4-fs (loop4): journaled quota format not specified 19:16:49 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:49 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r1, &(0x7f0000001900)=[{&(0x7f0000000000)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x2a}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffffffffffdf0}, {&(0x7f0000000700)=""/4096, 0xfffffffffffffe08}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0x6) [ 859.612258] EXT4-fs (loop5): Unrecognized mount option "]srjquotax34ČÄ="" or missing value [ 859.622886] EXT4-fs (loop4): journaled quota format not specified [ 859.731007] EXT4-fs (loop5): Unrecognized mount option "]srjquotax34ČÄ="" or missing value 19:16:50 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = dup3(r3, r5, 0x80000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$LOOP_CHANGE_FD(r6, 0x4c06, r8) 19:16:50 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = dup3(0xffffffffffffffff, r2, 0x140000) ioctl$SNDRV_TIMER_IOCTL_STOP(r3, 0x54a1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getresuid(&(0x7f0000000040)=0x0, &(0x7f0000000140), &(0x7f0000000200)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) r7 = gettid() ptrace$setopts(0x4206, r7, 0x0, 0x0) tkill(r7, 0x3b) ptrace$setregs(0xd, r7, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r7, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) getsockopt$inet_IP_XFRM_POLICY(r9, 0x0, 0x11, &(0x7f0000000940)={{{@in6=@dev, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@mcast2}}, &(0x7f0000000a40)=0xe8) fstat(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r12 = gettid() ptrace$setopts(0x4206, r12, 0x0, 0x0) tkill(r12, 0x3b) ptrace$setregs(0xd, r12, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r12, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = dup(r13) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(r14, 0x29, 0x22, &(0x7f0000000b00)={{{@in=@loopback, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f0000000c00)=0xe8) r16 = timerfd_create(0x0, 0x0) fstat(r16, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(r17, 0x0, 0x0) sendmsg$netlink(r2, &(0x7f0000000c80)={&(0x7f0000000000)=@kern={0x10, 0x0, 0x0, 0x2001000}, 0xc, &(0x7f0000000900)=[{&(0x7f0000000240)={0x18, 0x1b, 0x2, 0x70bd29, 0x25dfdbfe, "", [@typed={0x8, 0x39, @uid=r5}]}, 0x18}, {&(0x7f00000003c0)={0x390, 0x1a, 0x4, 0x70bd2b, 0x25dfdbfe, "", [@nested={0x238, 0x46, [@generic="752f2f0cda887a524bf84063523acfb532d08ae3dd03f77a9fe455121e9dc76126ce634daaa243e7b7b1411e3a7523f010ef023ad9f090a461b05f538c815ee828130be3e0d49ecd4c86778e74ff8146dcf522fbf3d100ff50728c229d6ffea0e9d48c1ae154f2b516cc3e7ec08cd3c139de94d2453b6f310fb34c63f31d03ff9c0d81f0a71b6597e6c6c838a8f39e5d0656", @generic="a71b", @generic="8b0299cc1b247821b337e36f3e7b7f43441ad511e69a3c953c787d1d21bb3e50cb222101387ab89c70895989ea0e70615e9cd99de6bc83a77004dadf56c000333bd14679fdb3e4a5b735b9c2f2ee921b4666a7af7adc66cd720153def18bbb7f09efc464ba2dab3d5328119d17cc0f8020c37dde6bab888c0b3a473c03f4706684840c4a67aa75499034b7f3b1c3a9db021bad610a6384f13f9474c5be761e3c425c1b18f3efa2c5dd26ffecde2cae00d99cd4dcba04ec74d723dd", @generic="09617847717e2637728d0632db5fcb4e1c6a9c4f63282f5c9b672b15ca9191fe2558a6eebe1df5a005f1571b03461aa1b7ecc1af7e9cfd484d1e23e0d4b7ea4b7b6fc8d8f70760b4c7f58cf34136320ace52e895d83c136352e5d8a9afe1fb57c0b5399627b7f8a40458f137fb456059fe39ffdfe2e987f892c8f5ef622f4908cfd3dfde15dc9087dfc950fb9eaa4c56b1128b349afe90e249fde510205ccb82b69d4e755270440213f084feac7a2501a80bceb73f740c00b0a11fdfddde0c75fb8b5980db331c3bb0a4dc5bb628c579f947bcec950396968d8201b028dc97eb0a68d9"]}, @typed={0x8, 0x7, @ipv4=@multicast2}, @typed={0xc, 0x82, @u64=0x3}, @generic="840a76fe250b", @typed={0x5c, 0x94, @binary="5618dc4ac5cb8241335808fd71e435d2da6a32717cbbed2b8a562affb4d6b70e7949af6676e064e20e0690072b310b94eb7b51163f4e30dc84265c590103b5728537d2f3fe3cd8784e3daae9f180c44236837c5b758504"}, @nested={0xb8, 0x37, [@typed={0x8, 0x80, @u32=0x3e000}, @typed={0x8, 0x7c, @u32=0x6}, @generic="cf980b88d1b43a96dd84b452a3bab5ab113c152401b5220903fc35c8805ed74bc5fab82387390a81974f69011ccd36", @generic="2eefb978efc59c202a7968c7ed7cd75928321dc2f09fe221a9b73b0ce9c5ac3418036593b67b3c45b8bb731bcb290750ce8004cd52fe74231054320c13e67ac5fab4b09199c22c76ed6a4fabd2948a96c2a3eaae63f7bc3f55c9eeaf4cc77e61cfd215eaeba9a2993128d7e7968346358d2a1cf8"]}, @nested={0xc, 0x30, [@typed={0x8, 0x93, @fd=r6}]}, @typed={0x8, 0x49, @u32=0x6f}, @nested={0x4, 0x61}]}, 0x390}, {&(0x7f0000000780)={0x144, 0x37, 0x400, 0x70bd2a, 0x25dfdbfc, "", [@generic="d13b1c1917c3e04fa70b433589f89c63998814de046069f5ca96e5a1e8ac02bc801bb56713900afc98c8ced25d60bd1735efdb2c55b52ae96ee599ecb5ad", @nested={0xf4, 0x1e, [@generic="d86fa4f948cfb3ca7039a839899e48fff77e006588f7f8af38abe1cf00b93199d9d35eac37c8be6bd45f67a61bc866ab184c765fa9747d50589f4b4573cfcb2ed708ef7894c32c9f5077cb79b9c3a0bc637ea551fd09e6dfbd06424787296d58057c361bbfd098794234247b4d17e9bf33020e99bc2c94aed09af8ef81971fcbea", @generic="1636fbf6f620d4a33df8b9277c07e28e29966a2fcad03a119b0ac4a655bf86c04f8dea4c125a142d7b5d0df6d7ded220022f9a0c5b0d1ca5be0f283b533084c92f8cb14c8e08c3bc5645a0737e2dc3a09e79056fb9f52858386393c208cf07b4e41b435938fe99c38fa81dd6"]}]}, 0x144}], 0x3, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r7, r10, r11}}}, @cred={{0x1c, 0x1, 0x2, {r12, r15, r17}}}], 0x40}, 0x80000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r19 = dup(r18) ioctl$PERF_EVENT_IOC_ENABLE(r19, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_MD5SIG(r19, 0x6, 0xe, &(0x7f00000002c0)={@in6={{0xa, 0x4e20, 0x6, @rand_addr="25a6a04a33cf353a68150e1443fc5bcd", 0x8001}}, 0x0, 0x3f, 0x0, "1b4915271586c9af09bedfe3c543b98c800a084e104d9bf0bcf59d2e5483e5f7b9233df7f02bc99bf37d84aa1dd41264ce8dffe4bd79a5c02b61ff4ad926d0680440ee39a964826a530a1290cac8d2f5"}, 0xd8) r20 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r20, 0x8912, 0x400200) [ 859.843456] EXT4-fs (loop4): journaled quota format not specified [ 859.861469] EXT4-fs (loop4): failed to parse options in superblock: usrjquota=" [ 859.892136] EXT4-fs (loop4): journaled quota format not specified 19:16:50 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x0, 0x0, 0x0, 0x70}, 0x1f) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) statx(r2, &(0x7f0000000040)='./file0\x00', 0x0, 0x400, &(0x7f0000000200)) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0xfffffffffffffe77}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:50 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) open$dir(&(0x7f0000000000)='./file0\x00', 0x101000, 0x100) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:50 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:50 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:50 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000080)="babca274769e620aa735fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e0ef8e63ba8863cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="0000401a7e004000"/17]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PPPIOCSPASS(r2, 0x40107447, &(0x7f0000000240)={0x1, &(0x7f0000000200)=[{0x6, 0x5, 0x3b, 0x1}]}) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x93ac1d8a24d2cc9d) write$apparmor_current(r3, &(0x7f00000000c0)=@hat={'permhat ', 0x0, 0x5e, [',cpuset\x00']}, 0x23) r4 = dup(r0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) [ 860.014870] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 860.057286] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (1923657432 log_block_size) 19:16:50 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/udplite6\x00') readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0xfffffffffffffc5a}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x8, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xe304, 0x0, 0x0, 0x0, 0x1}}, &(0x7f0000000100)='GPL\x00', 0x401, 0x0, 0x0, 0x41000, 0x1, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000200)={0x0, 0x0, 0x74, 0x5}, 0x10}, 0x70) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r3) 19:16:50 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000000)=""/112, 0x6f}, {&(0x7f0000000480)=""/82, 0xfffffffffffffd7c}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x44e}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 860.099878] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 860.144945] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (1923657432 log_block_size) 19:16:50 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa94, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="7573726a71756f74613d2200ecc7db1a85fa063c51e621167eff00b01d2dda39af9f156cd07e72ad2024d370b151a0a61b83d2ad59145d18dcd2914f99c7c2462a19a79d546b8b3a8ce1043d12aeb086af727b23ac2efa8f7c5c11983bd40cbeafc8281b3f"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) fremovexattr(r1, &(0x7f0000000040)=@random={'system.', 'vmnet1#\'vboxnet1*[\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0xe404) setsockopt$inet6_icmp_ICMP_FILTER(r3, 0x1, 0x1, &(0x7f0000000000)={0x4}, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:50 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:50 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="752e000000000000003d22e1"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/create\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000000)=0x10001) r4 = syz_open_dev$char_usb(0xc, 0xb4, 0x6) lseek(r4, 0x80, 0x3) 19:16:50 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCNOTTY(r1, 0x5422) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ftruncate(r2, 0x7f) r5 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r5, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:50 executing program 3: socketpair(0xa, 0x4, 0x7, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') preadv(r1, &(0x7f0000000700), 0x31f, 0x10400003) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000180)={&(0x7f00000008c0)=ANY=[@ANYBLOB="b8000000", @ANYRES16=0x0, @ANYBLOB="00012dbd7000fcdbdf2510000000e7ff05002c000200080003000000000008000400400000000800010001000000080001002000000008000100010000004c00020008000200060000007e000400010000000800030005000000000635aeddee7a0cd80004000800000008000400000000000800030007010000080003003f0000000800040005000000280004000c00010073797a30000000000c00010073797a31000000000c00010073797a3000000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000800}, 0x40c) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20600000}, 0xc, &(0x7f0000000100)={&(0x7f00000019c0)={0x2d4, r2, 0x101, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x8, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NET={0x14, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0xffff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x40}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0xffffffff}]}, @TIPC_NLA_BEARER={0x68, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3f}, @TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'ib', 0x3a, 'bond_slave_0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @empty}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x8001, @remote, 0x5}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'tunl0\x00'}}]}, @TIPC_NLA_NODE={0x18, 0x6, [@TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}]}, @TIPC_NLA_NODE={0x2c, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7fff}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}]}, @TIPC_NLA_BEARER={0xe4, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xdf}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x527}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x917}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x20}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xabf}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x9}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x42ef}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, [], 0xa}, 0x4}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x7, @loopback, 0xae6}}}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x400}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x20}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x774}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xbe}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}]}, @TIPC_NLA_NODE={0x30, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xc2}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x401}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MEDIA={0x9c, 0x5, [@TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x280}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7b1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x968d}]}]}]}, 0x2d4}, 0x1, 0x0, 0x0, 0x44020805}, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r5, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 860.294795] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 19:16:50 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 860.362986] EXT4-fs (loop4): Unrecognized mount option "u." or missing value [ 860.386384] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 19:16:50 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x3a, 0x403}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe2$9p(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) write$P9_RREADDIR(r3, &(0x7f0000000040)={0x28c, 0x29, 0x2, {0x7fff, [{{0x0, 0x1, 0x5}, 0xffff, 0x5, 0x7, './file0'}]}}, 0x2a) sendmsg$inet6(r2, &(0x7f0000000200)={&(0x7f0000000000)={0xa, 0x4e20, 0x252c, @dev={0xfe, 0x80, [], 0x23}, 0x1f}, 0x1c, &(0x7f0000000040), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="14000000000200002900000034000000020000"], 0x18}, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockname$packet(r6, &(0x7f0000000240), &(0x7f00000003c0)=0x14) r7 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) write$9p(r7, &(0x7f00000002c0)="4122af357f67a2bd7679a8b006879e571aa697e5d146fb58a15b3a01be89c275b49295be576502cc84852349288f114edcdffe5a6679fb6a5a64f34b67d87b424071e104e0bb4cefe75d013bc596b5e62f471404353766df3977a49a6bbfb15ab7c5684f0e4b7fc05b3a0834fde118733b46af875f757381923dec7a7b43f602bccb29ac135107fe01737e4176fb4a6b41187c23a259880a20bbdd6acee918b8e8e7d92156f768b3048b5ad3fd67e8a752e2667496d43fcecb1e7579412e2d731404f47ce4d78ee64b024baa8100bf51b066ac2b118a", 0xd6) r8 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000500)={r10, &(0x7f0000000440)="6fb1b12da7ff6b0b8501bf17536aef363c54ec2737e0f8fde73b6e34832937667cd981bfc8d70bd8a97a2bedff1080f4", &(0x7f0000000480)=""/103, 0x4}, 0x20) 19:16:50 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 860.429462] EXT4-fs (loop4): failed to parse options in superblock: u. [ 860.469538] EXT4-fs (loop4): Unrecognized mount option "u." or missing value [ 860.537690] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 860.572155] EXT4-fs (loop4): Unrecognized mount option "u." or missing value 19:16:50 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='usrjquolQ9\x00'/26]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 860.598776] EXT4-fs (loop4): failed to parse options in superblock: u. [ 860.616278] EXT4-fs (loop4): Unrecognized mount option "u." or missing value 19:16:50 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:50 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:50 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000000)="5f73d98a30bbce3fb35a8edfa3cd71b9", 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000300)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) r2 = accept$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @local}, &(0x7f0000000140)=0x10) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x2bf}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000200)=""/96, 0x423}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000280)=""/115, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffffffffffcb6}, {&(0x7f0000000700)=""/4096, 0xfffffffffffffece}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:50 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="750e726a6e756f74613d2201"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000000)=0x80000000) mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) 19:16:51 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) io_setup(0x4, &(0x7f0000000000)=0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') r6 = gettid() ptrace$setopts(0x4206, r6, 0x0, 0x0) tkill(r6, 0x3b) ptrace$setregs(0xd, r6, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r6, 0x0, 0x0) sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f00000019c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0xb972384776862fe5}, 0xc, &(0x7f00000003c0)={&(0x7f0000001b80)=ANY=[@ANYRESDEC=r3, @ANYRES64=r6, @ANYBLOB="000227bd7000fcdbdf000300140002007606000000000000000000000000000008008400b00400000000000000000000000000000000faf9be2b25d72a33adf29cab24facf0800f5d10a5c34194f6afb90e53d67f6c29a4bae21aa5a8559bc0ed09ba80bac29121217456cd213439d72bbf95b63265c7f8ae1ad448cd67e0d430a6872fe5b40a93254ae2617b7835538dad3e08183cfdd3ad4750be6177e834bb16a26e5af720a2908146f606388c7acba5a1fb7a0a5e32af14b4ad97675056f441b923495e169aeda6c5f8fd988308f0698de716b280e4e54d0ed916711ca4cc6630406a46d5be211b5af54ebc3c4"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x800) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) io_cancel(r2, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x1, r7, &(0x7f0000000100)="f20230da59f5dae81e7b17cc28f32f05a597a6d138eccb8317fc01e2e08a9eae8371315660a4d55607e2f4bf698876d4ba236ea30d978ca8bca1aea7c285972b62e3de5f11c61024d979214a4b019e6f96d70d4801ecde653b67452b85536f8acdc8cd3a30349780be5783c222d0e88b", 0x70, 0x4, 0x0, 0x2}, &(0x7f00000002c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) write$9p(r9, &(0x7f0000000200)="9202cbb467542eb02102553192726a19e4746f48acf6efe11389a3b3d3b16e1f3105149c47d662792d7441c87149c3599418d889bfff4ca39a430905d2d400b8f2a0b8ecccc6988bcea627605e389d6c60a80b83c5b8ab68f93c622f276e356d88e19761f39a060e5249a62a4677608eac3be61a4958dbd0e71a041af5ce9ec1300db7e7bb7ff13781a655887d2c7f06cc6ea3b7f1f4a152903b17a959877db553e26b4262", 0xa5) r10 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='\x00\x00\x00\x00\x00\xb1\x00', 0x0, 0x0) readv(r10, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000001a00)=""/98, 0x62}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4080, 0xff0}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/220, 0xdc}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 860.777789] EXT4-fs (loop5): Unrecognized mount option "usrjquolQ9" or missing value [ 860.849976] EXT4-fs (loop4): Unrecognized mount option "urjnuota="" or missing value [ 860.882901] EXT4-fs (loop5): Unrecognized mount option "usrjquolQ9" or missing value 19:16:51 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 860.912610] EXT4-fs (loop4): failed to parse options in superblock: urjnuota=" [ 860.924310] EXT4-fs (loop4): Unrecognized mount option "urjnuota="" or missing value 19:16:51 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="7577726a71756f74613d220000d9fecf9a6e96245f02363fdacc4c4179eebaa05e4653e2db3f26439e870d84bd6624f3a67f420af3ecc1caa9c21dd7c344e860"]) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@fwd={0xb}, @int={0xd, 0x0, 0x0, 0x1, 0x0, 0x2d, 0x0, 0x3c, 0x2}, @var={0x5, 0x0, 0x0, 0xe, 0x1}, @struct={0xd, 0x1, 0x0, 0x4, 0x0, 0x1, [{0x4, 0x3, 0x2c}]}, @var={0x3, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0]}}, &(0x7f0000000200)=""/230, 0x6f, 0xe6}, 0x20) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:51 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet6_tcp_int(r3, 0x6, 0x3, &(0x7f0000000100), &(0x7f0000000140)=0x4) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x9, 0x37, 0x2, 0x0, 0x0, 0x81, 0xa1402, 0x8, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0x0, 0x6}, 0x2000, 0x3, 0x400, 0x4, 0x101, 0x5}, 0x0, 0x8, 0xffffffffffffffff, 0x1) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r4, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) r7 = dup2(r5, 0xffffffffffffffff) ioctl$GIO_SCRNMAP(r7, 0x4b40, &(0x7f0000000200)=""/140) ioctl$TIOCGWINSZ(r6, 0x5413, &(0x7f00000002c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$void(r9, 0xc0045878) 19:16:51 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:51 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) r2 = dup(r1) unlinkat(r2, &(0x7f0000000000)='./file0\x00', 0x0) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 861.145198] EXT4-fs (loop5): Unrecognized mount option "uwrjquota="" or missing value [ 861.203599] EXT4-fs (loop5): Unrecognized mount option "uwrjquota="" or missing value 19:16:51 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 861.289582] EXT4-fs (loop4): journaled quota format not specified [ 861.304677] EXT4-fs (loop4): failed to parse options in superblock: usrjquota=" 19:16:51 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 861.337472] EXT4-fs (loop4): journaled quota format not specified 19:16:51 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 861.411368] EXT4-fs (loop5): journaled quota format not specified [ 861.424419] EXT4-fs (loop4): journaled quota format not specified [ 861.453543] EXT4-fs (loop4): failed to parse options in superblock: usrjquota=" [ 861.480531] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" [ 861.488132] EXT4-fs (loop5): journaled quota format not specified 19:16:51 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)=0x0) fcntl$setown(r2, 0x8, r3) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:51 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000380)=0x0) fstat(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) r8 = dup3(0xffffffffffffffff, r7, 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000003fc0)={{{@in=@multicast2, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000001880)=0xe8) r10 = timerfd_create(0x0, 0x0) fstat(r10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(r11, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r12) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r13) r14 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000018c0)='/selinux/mls\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r16 = dup(r15) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) r17 = gettid() ptrace$setopts(0x4206, r17, 0x0, 0x0) tkill(r17, 0x3b) ptrace$setregs(0xd, r17, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r17, 0x0, 0x0) r18 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r18, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r19) r20 = timerfd_create(0x0, 0x0) fstat(r20, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(r21, 0x0, 0x0) sendmsg$netlink(r4, &(0x7f0000004180)={&(0x7f0000000100)=@proc={0x10, 0x0, 0x25dfdbfd, 0x200}, 0xc, &(0x7f0000001800)=[{&(0x7f00000019c0)={0x1ec, 0x22, 0x2, 0x70bd25, 0x25dfdbff, "", [@generic="518f8645b72d965f0335c3f3f5952582de8225676b19a2065abf82153dceb8ba1936ca4f46447423637d01e9b7b0d13cc20a9ceaaa5be2703d95aad7f9aa2a12861ce2a7b1fbc4445938ce3c4e76bbbeabc2bec2e2bbb6f350950e2fbe4a7e6518eddbd01a730199a55234816267257a857ae6a76a19db145abda24e8cbdfa5386c2e0752ff5575c8feb4c7bf9764e32b7bf056eaf5001393b17c2a19d5531f3019d694af65d7085", @generic="d5d12e52325cdcf393225f0fddfdf644d48be6bebcacb57bbd3296c7ddd2390af8cb83f9b010cc32d4", @typed={0xc, 0x59, @u64=0xe6}, @typed={0x4, 0x25}, @generic="aa323d2a5ce58dd252da6916ac56f9c0099cdf57278f6e27db91f23aa22516b093ce612a8aa65b5f7a0034dd54059959738e52108ab599a1b5954cde7ae4eb5286cda687dfc83f8007a6c375f3bb993cfe5039b3107e19774b73b002235c456958612998e6ed0e9fc8f29e7d0f90282c14a2413174e37d681c01ea38388c305ce72952ed6286947457a0dd94684a630608367d48c3249c79af832ef89e30e739f9727e62c5ea968db03d241599bc8ae8783afa801e6e290649df636b616fea16e2a6c98a8dec7d8bdeba7c0d69b3a4a11e3870ab8a2d7a3e5e6fd0fed68d20f9d67982e2fa1294a6ff083d9d3ae8bf425a33e865bf3a", @typed={0x4, 0x60}]}, 0x1ec}, {&(0x7f0000000140)={0x10, 0x3d, 0x4, 0x70bd25, 0x25dfdbff}, 0x10}, {&(0x7f0000000340)={0x24, 0x16, 0x2, 0x70bd25, 0x25dfdbfd, "", [@typed={0x8, 0x2a, @fd=r0}, @nested={0xc, 0x15, [@generic="aefe9e13a866a5da"]}]}, 0x24}, {&(0x7f0000001bc0)={0x1270, 0x81, 0x400, 0x70bd2b, 0x25dfdbff, "", [@generic="cfa3f351c3fbab2d6dc710c504965e0e51afd02a5400f1b3915fb800ba4751a92d580b254dcae1ab6d42a71e2264c9feb4e0d4457f49ab5af6b0746e043736072ae1d0795cc5e6fc19ca23333fb20c4121a288ef2e8b4889524bc0e5ea1c8dea2ccb515c50006f056ed93f89fee121f87f8bcff1a8c4b10984e99ffb5194478624b31929c6aa52b78f79ceddb36a49443a51e5dba9cc2578fd2ffbb0baecb90249e42c14ef1c14ea78d85f33a482c459e387f7caa566e1d41223022797a49c34ade2e5d0a6ca122110d958dd2c53f027f23dcaab5315533100e9f5e3d6e942361f5b5598d3b20385313d13825ec4e6cd1c1146c1257f9a103a1966534a9dd2c79bdcc8994886dce7904599d1705895ca384a87dea449c952b54c8f50460c3c2183446a696652502a66a2ded27705bb02ab51b5518ea52b0b43542fb5beeb56677cc470fc7293ebed8c6a94f1d720392040626e01d644ee39ea7b51b8a89652e9d589ececf636c1c5d215705c5f9a9fbbe3cbfb39964973ed6834c3d517ae1f450e19485ada20ffab89a258c8019b74aaf28523033fa8501b421d654c699225c652a404897cc8049523885c76ef185c8a011f714c0ec59597cc72ebf4d9a38b01f61e6fb60c009aca3ad25ed5cd80721e5bd50b26d866fb1b6a40aa9a519f5fefda7009a33da9b3734fb4ac9dc84c4c68a68796f6ef8b94150792a88b4eec247513d5ea7bcea8f08e2e1a8f841debdfcbeaa6a5ef0b49802dcfb0c40e4cd5f7a07813a7f2ff972056630b5026b81314ea20225712d00c2d66af7bd8c62752e7292356c6a11d3db4bacb3b3f528751a9de2a7cb3834a0613a6d1c43837f2567908c333b431fd82715c01fb41564e06a4a499a6b441ece7ea53258b162aa4b143cd14eff0480377f4e12f0f53e639e0add325e35ec7a3857bf55cfd115c0038a29e8bc2fe80c926a56ae66550a4fe76d34668db933214c45257e1e36d47937c038955527cc14d7dca04710cfce9d6fa9c0b8cc50f177bbd091eb3d9cdb06a150696d275fed2d02b1e8a94391e5e059ae49a40c04cb36f6221b0a24b646789824f964cd29c851204760ded67c64c0e124508fc0ba090e1b07c03b231422728b9208caecf764cb91d6b9006278ef0613cfde9dd42befa0753c9213f58ee260ffb49334675ba2ac5d4925ea4c2fe378a0e1f033b6918ec21b74eeed4328e89f05a1945baf316fb0a27eda4eb6b96a88f8720b1524b12587bc6d527a9914b88628a2828e8030f1b943d1251f5035e8e2f5fb4ee1eca407fed2f8238355ec411d29048299896e0d05a8e73075ff0efe87c3959e301fac4d5c4b8608fe6381ef83b5160a9d054c78a69d68a246d5140cde13238e654518c120bc06b333934e11397f540aa24d51fea387b6993c10ca2cf4bdebff81cf5793e7a204760a8fa8687f02a61373e454ac87c74f84538ffc1547fe60c50b6be1eaa4ba89b437fd85c9fef99143c266cc2ac907c7ab6d5110610a79bd77b61baf64fb3b538d6d1b0c1df90c12bd75ae7e5fca3bac718d5ecf6b6735c63efbbdc6baab659e999f14c4e4c23af8333d925e4e69411467c0964b6ab74cf2503eb5fe322458a54bc54b079e27e872899c4f93d12f09b1c3832f9b7049b7675484a3f16e028c1a4c1cdceca86e11789d745e46b5ebca2ea4e7374b14c637b6e73a64b192bd66e3544cc9828e13ef6421d16b52bc1583614618b278e6cfedff5f94f8496b471542aafb0837be57f24004cd645998f8a00a29a428c1b1bf445c9668e829cc370b370c591d268a207ee7d4bbb1b754265208a2ec6f89f85fdc470c912d2785e8dcecbd928a64654d1836f62a332806c2816ad0c4f7cc1329a8ba4a10136843e6a9a9b2d8fa2c17025ae32aaf1608cc67bd140cd0fef0ec77a755c6c98a69b555ec56b6a643a538039c2f2b0c257627eae2d67d600b7985c5f69b7803f79b6c6961014f9ad4c8bdf65945bd3d362ac9c3fb01b5ae4e3a1db1f7b7105db83f44565b9bc5c912120c7ffe5aabbbe056adbb4ba204884cb065594011bc5415dd18c150a91be8102fda1a67cc02867bd472452c41321af6240b8695fa79568290da7882d5dbef2d6b0f1f72708ddfc5fa02af184a51fb30e12ab4533121e1616c487bf0c38d7f9079eedab3d6e61fc6e53f752e3bbd0b680bbe5dc60d17e457ff039fbc5b07066e4f0dad75d6d401eda5ce13517f2382a697427870969c3b32f458b2d9449e64130905928db36c8762120bdb9d32d5c3931710d4fe5a74e9f6a9f07e7c231e8c79676fff1dbac9ab1e26f17ca570aa369268ed3664613a86ee102ad274a70e7af5c5788f573a5ddec0126474310c7e90ab45c337a3c10bd8dc9b25f527886ec0ba6c2319d4b53cbedc17f98002dd2914887d8932363d566982aaf21359d531294d3182a041735f4ea2644659e5c879a2337ae7270cc80ac884adf8caea68068d12945be3f91f96c8fa63bfd42a56590b7aada4c676c6f531d1240c8eb954673ee7e94f4c2cf0a57038274812aa95bac4caa5301691ab115ad16992a6687278768de62fadb1e7ee8337141487010273b98f551efbacc56bdc5b48ece365fc6a2bca64ff34c87563f084dbfcf8bcf2e8b725d4c849ef141c44b12e590702a99be2ea2d479fbcc30626914ad042772f0f8e0661b73c462a5be6d2941fde595303349b07a5f56d5a8b6dbee4d2ac3d457bf63718ef2139a14a713713f91e1de3e568ccc2482e1ade6011d1a8f2d30924596db196d3da6f9b7eb728817de5d6b9736cc9b071156161397bdfaa95e4e9c7453ca2d2f7793bc97746ea1eddb76b25535e7af171307cca0530e34e71f3dc901654b7205643ab197d4f083eba0b6fe01f7b1d871da3112282e5887edf4820cdecb3ef4d328f5de944cb5d40f8a8cbb68dcae4a4bfa7e2a4318d3f43aebee79a8d7eaa997cb5a83b3e6114118c976cdce1a1149e64916c2aa531d65de7f52dc7f7ab1cf5294265ea66d56cdd57edbc4a72892114bf7c20d533d329e0a37732cfb4f3fea87b0dacd4b76e25a4ea8cad7e357ddd141f3d132a2c399c90b7614d8ce5b9dbdd70269c0985ce6207a7abe0cba99eff3cbb6cd4a638bc9342ef9640e3b7888fed9736788fb866cbd2177ef627b0d2d52195e18539469cde29fe136680f015c5b6f6d5769bf8278bfa7d0a9be8324b022b525eb399a847595e830ec3d9c60e944e29250188a2e1cc0943997c4b60c0b0ea3a2b08d7d8496701bebce8990497e8a6b943d0678c15808a82392d61e739e561ed8402ad27f72f93aade713568b145cbdbcc7fed6cc62b281e8926fe179012f68d75c53ef428c4d3e5b6fdb5e85c4ec954eb68615c8655d2eca15994f6df845c3156331b6a9f0cb4eff283770f3d2e613b41273230053ccc870be9bb4632ea1e463cf58b67fe724a3beb8f1137c4c2ec0fbc027ef6878279741d5db7a8b02ecb1238ac000a1aaa6ef054aed972df63b7869a80e0eae9daec59f23fdcc6a1b5c77d44098eb659a19c249eae05b5b7449c5ddc0be1101920edf8477679c59b1d7bac54300209a71c5ea6ba4017de6953f14c9bf00e1adf6b526c90f2a93292c0dc6c33f371aa748acedc4ccdd5b9126784b4a9c6879ef0cad4f795765bf5de5869bc2aa519d36bb0167f6bf062ae9a0cdceb295d89f412060d4b0603d483d3a2b6fc4896751e50149d1beb293d42dec0694a288f328e0c678edf55a70d2105d35c6c760deb46e505351b1d7f3648e62cc6eb9f3f87d6c7eff55dbbb90141e3e1ee192df568bf6f58db7b7e967739e0dc56c3ee6823ec8c000ee198c860c25c53278d7bd6a7b0cce56a6ea1d54552c5b5481d782302d566f8025cbc9f1152a3f42333a77fb4c414da7e539cb1f4d0c54a30c52a28b0ecebfe9c18c21cd37382db53c970f6381aaca9d84f45c46c3391689da2485db5d06bbeb40a9775f9a6dda61f6e213238baae224ae8bd74aa31b2705812d4c3bbd86656a23dd2747ea88e33fd7649d30d146d2ac8f85e166671cb854f4f32b6ad316f563d110b5422bda0b55f3baec2f5d15d60990c1edfd9d32811cbdbfdc13966ea695836983689fdf3b90a845300578be50e164bb7eeaba519ac9ca03cdd9a00d76f876e487f66602e581a5afe4c677f065b8ad3dee111b287bfbdba890b622eda976764a26cbe074cd759cc992d6c5cb15ff5b5df4ea0cd0115b802e5dd333e16afd21bc846dc24e721f69e40939da1d22be804d0339e5e81152f646ae9afca00d1618a4d47f837bad3806dbaa580bf6f262a87a7e344a8467eeb1fcbfffccf9d262df5acfd7d2c526c8ad65e4867d07acaaf18b970f8d91a953cb9ef022d22959a7c4d288a4b4be789fdac1c537a0589f27b30ebe82a35fd1a91d9722af316355b13106ec7dbf18f4731a37f34c0444dce0cf76123229c11a1f1fb2bbcddd53cafdd2a0ec8127ca3f48e0fdf6f6bbdf1a945a4f46defac55886da45ada9f4856c9f5abb213e48a0d7358b75556b0f5c0fdeef36eab2df07d0b3343a87830798503a680e7a374f5654ebbf6410e29b23377b3528ddfbf9cc7a621824bdbab68c4302f4b5cdc7fb6a05d722e10d12418335bbaef8b0e8fb251ae0d85cdd86a5581d78993bdd17582307f2e4d69c3991f22ec5cd020b471e90401a77ed5ee920cbf6e07b34008a590fb6dfc56f673a0c9a50794dfcaf25042d1aa79f2f9512dded87d276bb7cac3acdd3dc8e429a3d631fd13fe090f2d5b1086184f17d4dd405604161b3d5dbf5bad0140e412dfba45afc01daa68e4cafb7d6a2cf97a0135052bf301d8946d6ac9f0422100133d64677bf787988aaeb8f9d4fd0c1752c38b47d20493e7182963166dd052feb78757ef0c731fb253c22885b00f5cb29b7df298104c0e1eea478168dea5dc36e2069e598dea1e1fc560c1769d17212aa9c78a65041b9bae4b8917cdb345d23a749293578076da7be73a088199533d0dbf0baad20b87cac9f36ee16ebe0a7bf90bd2255770b10cab5884df940d31ee29b758cbe273a68a40ff4cdecbceb06dce40ac424b535ca513d701f0d5b6a6b360d23429a1b76977135d16a7273764c838ca869702fffab071f79f461954b1fca233cdd97dd7135e9e3b51075515f4168609cd558caf7c3e9db3209267922bec50a002cc79e2c5fe03475661e75de9e4f347c269058ff6a21a82056643e4857edaff255a870d1673d4c114f9f4e15eeaa823b63d90c1d47fd4c30043a90388722c70d27a7e24679630111bae2a150730f021c03e46d5de58f5700d7a2d7a7097c7629ed463863db7481e8d733e1a919530fa19333856bd6130a2a968b4233bb376854f21ebae5a7c863e0b1e828f1cbbf46315cc9092f966be28ae8cd1ebb94dcfa18412aedc84679d92fc09c4f94bede47ab5828e25fb59ecdedefc7b9374e1f01a1c47bb0f838bf070b381a7761428e181a36841d5032466ae5ba65978e5725e0692f0fc84c774543fd914d859c3e04a0bf766e890c3603ebeefd2e069179b955bf85f624c0d83e1edcbd633530018435723a3962eea5addde49b6a4c8f853e7fca8e037ee0d1e1dc25cd90311225e52f492fb9c7421047cd3ee601a8af9ae027d00f69394e7efbd22826bf0aa546c84fc3b182a3e3201ff14ec172b8431f0bb0156d56a49e7a6ed52ead76a6f9b70baf4c706506b1dc631f6d777582b16a8e7f48551154cfa94795a05bfd684763a6afded3e3e6ebe0cc0585680de81dbcf476255addcec91085105ba176b77b7e02fc63fdda088f", @generic="e5462a6dc2a7697bc052a86a9c1999565e69cafc165af5682bd63d821ea0f732a79351b0ab311e7ed2c8563c99fcd27c59fca5463f4de7e303bea71bd9172ccd90f6d121a37fd97a2d7e9da8f2b046f7b9dab91a0c6e5dc319e33a2bee1216af3de918cda1670fa7770c56affa60db7f47560ee0981312e7e83abd0229e8f15bd18662dc51dd48220ce10d2bfd2bf3fdddb33760ea17fa7cfd29da60fc375a2edc4e9fe1c96a51c87c8b4fae03c35595576d365057925487d6a6c6550ebf238f2c92ecbffee666fd05f4e1366dee29", @generic="c58a715cedcae321622e9ccd", @nested={0x184, 0x7e, [@typed={0x8, 0x89, @u32}, @generic="117a09c83bb4586885e7fd781dc1f7f52ceaaa353de4042b2ba61928d38615b60b0ef4d81340af23c4edeaacfeb74dc34a5b49912229e704d7e490bc427b6a774fda9cd285d205de5d65271a61da1b47ff242eac6f6252f15c8d2d4666e082c685d25561fc5e907e33e78093f0682b6fff8894943364ad1921e8586079102f7f2addfb2aa6e141cbc139adee9d37bef47b17f8030a7a6f2beeec1e0cfe1a567e08987b6a19610117e2fa0cb9c9d9a46db902f34d9a393b5636eb3f84d0e34d", @typed={0x8, 0x71, @pid=r5}, @generic="27f09b485cbcc4fee5e316b02dbfbc2346b5bb675b70b575255284beda4c5bb0ac98a01e9e5ae5907cb9baef655929994a7e40309f31204d7d67ddd57ed0ad66b6222e96335ea471d5cca7419c50b1e61a482399a21c9cda3e1595ff611f48a8bd8845c41feb53f4625efda21d3e307c02f6ec8a40f178daff70e19da9b86b9c9657153afedbde95e0dd18abfcfe373b19a522d6a3b79b090d49fd86d77bbffd16f7e7dd9db1", @typed={0x8, 0x5f, @uid=r6}]}]}, 0x1270}, {&(0x7f0000002e40)={0x114c, 0x2a, 0x800, 0x70bd27, 0x25dfdbff, "", [@typed={0x10, 0x7c, @str='/dev/zero\x00'}, @nested={0x112c, 0x4e, [@typed={0x8, 0x94, @u32=0x80}, @generic="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", @generic="2b07e1a0bc19143812f399b45f1c41a8b14dabb1bf74c6000abed0bd4ddd3d095813166bbf714b590abae3ce345a015f598a88ce6ba3c58793ae7191aec5f595d593bab0bd6e54962541912846bb14a1a656bf9388bb472bae924cfeb517ebe88fa92c3e502770f7e42fb9b0a03c4ede2c8df9903ec101a1f2909e8fcb3d339a9e1b6abb759c95029a804c95a1bb1629d7bbbd5a8ab5193b82b2f3600b2356d99532745b35fdddfdf0e7d2b7b4eca32115ac6775d27e5281e7de32368a8b19b69e2d45495e3ebff6022756b20c82b732f58d7ccc18b84d8338dd3ba146e666ce3e314c78abe54b6613c2841c9f0798c9", @generic="611de2b564ce20648238f734c93d52231afd85dfb9acf1f65e6fcc8d3232cbd0484950f95233acc1ac3af92129706d86"]}]}, 0x114c}, {&(0x7f00000003c0)={0x2c, 0x39, 0x1, 0x70bd2d, 0x25dfdbfd, "", [@typed={0x8, 0x77, @ipv4=@empty}, @typed={0x14, 0x5f, @ipv6=@rand_addr="0194ab177b5e11a493a15ebcb9f3d0a0"}]}, 0x2c}], 0x6, &(0x7f00000040c0)=[@rights={{0x14, 0x1, 0x1, [r2]}}, @rights={{0x14, 0x1, 0x1, [r8]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r9, r11}}}, @rights={{0x1c, 0x1, 0x1, [r12, r13, r14]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r16, r0]}}, @cred={{0x1c, 0x1, 0x2, {r17, r19, r21}}}], 0xb0, 0x67be71408d6890cb}, 0x800c8a1) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000000)=""/108, 0x6c}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000000200)=""/270, 0x10e}], 0xa) [ 861.503921] EXT4-fs (loop4): journaled quota format not specified 19:16:51 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) syz_emit_ethernet(0x1e, &(0x7f0000000000)={@random="4df1b758231b", @local, [], {@can={0xc, {{0x4, 0x1}, 0x7, 0x1, 0x0, 0x0, "e0929bacab4a1881"}}}}, &(0x7f0000000040)={0x0, 0x3, [0x9a2, 0xe95, 0xd6e, 0x11a]}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup(r0) 19:16:51 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:51 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r6, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x18e20851}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)=@ipv6_getaddr={0x8c, 0x16, 0x1, 0x70bd26, 0x25dfdbff, {0xa, 0x0, 0x0, 0xfd}, [@IFA_LOCAL={0x14, 0x2, @mcast2}, @IFA_FLAGS={0x8, 0x8, 0x40}, @IFA_FLAGS={0x8, 0x8, 0x200}, @IFA_LOCAL={0x14, 0x2, @ipv4={[], [], @empty}}, @IFA_LOCAL={0x14, 0x2, @mcast1}, @IFA_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @IFA_CACHEINFO={0x14, 0x6, {0x1, 0x80000001, 0x92a, 0x5}}]}, 0x8c}, 0x1, 0x0, 0x0, 0x8000}, 0x4004014) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup2(r1, r4) [ 861.659799] EXT4-fs (loop5): journaled quota format not specified 19:16:51 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 861.708319] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" [ 861.731900] EXT4-fs (loop4): journaled quota format not specified [ 861.735103] EXT4-fs (loop5): journaled quota format not specified 19:16:52 executing program 5: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80302000}, 0xc, &(0x7f0000000040)={&(0x7f00000002c0)={0x664, 0x3b, 0x4, 0x70bd2c, 0x25dfdbfd, {0x14}, [@generic="270281cd6cd0866aca171e19a651dde758562a7e2aff5585f8717ceace978f5f5a5cf8e8daf44457bdc8227a567925a07f155e5c7089527735069c8d3a61a71dd3e0fda887833624f71fad943d3529c0474a34172580a13dbd9d6e334687f304e0a60779136a05a0f90f52ba6fab7dee4053dbdf4123804e1b7f495d52a76c48b0b6ec34264ea01b3adbfbaab61291ccdfba9161df261a2430aef011cd0cb5db549d446a1c4f78b8b12736132b2e25321dc28c0860eba48a5f630d85a3a9f56ae2cb60e15ef970faaca683527b2b332a69cb9ae348f22eb3675b981a7c9477c0e91ac05ba6ea75f00acb50c3310de4e0d59f7a39b4bb3585", @generic="2e0fd82e4060c5bf671aa063e2d114731e7de8eb7808a7f6c335d44f3a4bc352beef390070fff662c77d001f63dc0b82e83c072b402f2112393fceea53e3ac84bb1fe8c05da159132df7df1f76d6373cdc6806ade996c29b9d07cdd718ff3745f033c543ae7eae6e28bea5c2ab31aa5e38dd08a5cac7258e670125ab9083ebf789801047a43dc0e48ffbdbbf07d38e78d2f816072aa7fffd2a86d85138c37e92e9ffa45b69e28c8046241cafd90bfab708d895b7be9b4f8e", @generic="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", @generic="a5c6c6596d767a2dfd8fcb9a9764a3c9a154cb9bb63943ffc11b54c2c869b075c0354778dc858c4eeba226ead5c1abb546679723036dd4cbd7e8d0867ca66218d4caa7752f26b72b84c5f575500e6eb98355008dcea073e7bf71ebc4368425c0e71cb8db79490712103dc29838a7829e49c8beef3e4179cdb166b231ea5ecec03eb59a8139474c6fff7c65e24f0fc046928584b61649fade6edc9aa94779ff67359d7c13", @typed={0x14, 0x5d, @ipv6=@rand_addr="b4d236f2aa3d8568b7e3c55b067ce1db"}, @nested={0x2d4, 0x1d, [@generic="926870aa9a477707c79f96d134fbad972039f94d3846996015dd608536c3035220ccc9143438c4292c4a4c84b8e189ca9da642af5286d5fb809d61469563d8e351223e624b89718b18d5b20a05349561bcf30bcbc7005b1ea130cc80d263f9ff894d40709bf44e4b6bfd5f4702aa5192d4bed63b1fb9cfe68200bdcb7c443a680826a93df07a818029ddbf031a7cb310a09c587f7e11297e13f2e3bf93f80199cc02368710debe1e6ae202cc", @generic="57b8c89b95529150c760624f0c6b039d02a153724e8fb4124854fe05af9979d60d9e77c7cd67a2fcf3eade3ca400f55c42ff01317b86b7610d4de95925bd1bbf403dfe4440a964d1e82572c0e7be64588fe373a44792aca97dd8e86bca628c3882977f047f70a6c52022046e4b9ba6d632c4a11b41db8f7da68a96cb15625611b9ddbbfe9b250d60d57367442567b7b674e22dadb03d8a270519d18aa45741ffdd8c7ebc667675448e38ae0383776e34bb22ca5c67114469b4c4067fcf26832ab29ba6a359beedea5cbc87b092", @typed={0x2c, 0x12, @binary="5795d0ddf5e2e7ee7fadcc70034ae8f8fb56db4fcfb41418b4693ead4a1ac762c113b3ff1455c1"}, @typed={0x8, 0x17, @ipv4=@empty}, @generic="388e036e0f032c7595bd9c2b3a37dcf17f4365ba273cf504e339007f82cba40fc9e47c58fb1dcef4709d66d29ead8fc42ce068c0e84e346130aa1560fa96e8565367c3dc480dfe98a21361f2232799ef4eb75ea4b15ae114e6f1ca47e8e82f45db4843dd12890327bc0f1a00724be644ed50312cd7b8bdef50f96ce32591f980d6242fd06fd1d117b89e5adc1e27eac2be3256bef2886d060f8c88f611", @typed={0x84, 0x57, @binary="0c2dcf7f377f250554f51c1894aeaaa47f91248bb59329d54b7f65bbd791821717a7080c687470ff2303792c940bcd1784c5b9dc6540cdc53910be0f17f975d500ceae61e1846416d10bbf3405aea63869938e9485620d554bb88ab25e611dd526420a00cf4e432f0c4cdaa92ebdfb5c17bd5af7b77c165a886a0ef718"}]}, @typed={0x8, 0x58, @str='{%\x00'}, @typed={0x10, 0x26, @str='usrjquota='}]}, 0x664}, 0x1, 0x0, 0x0, 0x4}, 0x8000) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 861.788742] EXT4-fs (loop4): failed to parse options in superblock: usrjquota=" 19:16:52 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 861.835255] EXT4-fs (loop4): journaled quota format not specified [ 861.915909] EXT4-fs (loop5): journaled quota format not specified [ 861.934756] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" [ 861.944110] EXT4-fs (loop4): journaled quota format not specified [ 861.957541] EXT4-fs (loop4): failed to parse options in superblock: usrjquota=" 19:16:52 executing program 0: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000001c00)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000001d00)={&(0x7f0000001c40)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001cc0)={&(0x7f0000001c80)={0x34, 0x0, 0x100, 0x70bd2c, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DEST={0x18, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1209557b}]}, 0x34}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x126, 0x126, 0x3, [@int={0xc, 0x0, 0x0, 0x1, 0x0, 0x1b, 0x0, 0x21, 0x7}, @restrict={0xa, 0x0, 0x0, 0xb, 0x5}, @union={0xb, 0x8, 0x0, 0x5, 0x0, 0x3, [{0xa, 0x3, 0x325}, {0xf, 0x5, 0x5d9}, {0x8, 0x4, 0xd}, {0xd, 0x4, 0x9}, {0x3, 0x1}, {0xf, 0x4, 0x20}, {0x5, 0x5, 0xb1}, {0x5, 0x2, 0x1}]}, @ptr={0x1, 0x0, 0x0, 0x2, 0x2}, @enum={0x9, 0x6, 0x0, 0x6, 0x4, [{0xa, 0x7}, {0x10}, {0x6, 0x80000001}, {0x8, 0x6}, {0xc, 0x400}, {0xa, 0x3}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x6}}, @datasec={0x5, 0x4, 0x0, 0xf, 0x2, [{0x2, 0x7, 0xffffffc1}, {0x1, 0x3, 0x9}, {0x2, 0x1, 0x7}, {0x4, 0xfffffffa, 0x5}], "9910"}]}, {0x0, [0x5f]}}, &(0x7f0000000380)=""/83, 0x143, 0x53, 0x1}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000100)={0x4, 0x10, 0x2, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) ioctl$FIDEDUPERANGE(r4, 0xc0189436, &(0x7f00000019c0)=ANY=[@ANYBLOB="030000000000000001000000000000000900000000000000", @ANYRES32=r1, @ANYBLOB="000000007f00"/28, @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\a\x00'/28, @ANYRES32=r3, @ANYBLOB="000000000300"/28, @ANYRES32=r6, @ANYBLOB="00000000ff0700"/28, @ANYRES32=r7, @ANYBLOB="000000000400"/28, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00 \x00'/28, @ANYRES32=r8, @ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="000000008000"/28, @ANYRES32=r9, @ANYBLOB="000000000300"/28]) readv(r3, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) setrlimit(0x3, &(0x7f0000000000)={0x3f, 0x93}) [ 861.984003] EXT4-fs (loop5): journaled quota format not specified [ 861.999324] EXT4-fs (loop4): journaled quota format not specified 19:16:52 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x618482, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f00000019c0)=ANY=[@ANYRESDEC=r0], &(0x7f0000000000)=0x1) 19:16:52 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 862.142044] EXT4-fs (loop5): journaled quota format not specified [ 862.162485] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" 19:16:52 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x4000, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000340)={0x0, @broadcast, @multicast2}, &(0x7f0000000380)=0xc) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmmsg$inet6(r4, &(0x7f0000000300)=[{{&(0x7f0000000000)={0xa, 0x4e22, 0x0, @mcast2, 0x5}, 0x1c, &(0x7f00000002c0)=[{&(0x7f0000000200)="070dc563ecf0ac0df4076291b40dd1440c924e15f05fd33ac31ecde93f91cda836c02be7d2887def090779192b13cf2afcf5b332972ea21ee1e49c99828433e40cd21fcd9beb0911c9877f26801fafe8dadc2fcbc2e4a745495486aa4f0612dc4f5a5d0c8ee10a69be376028b79926c37e30dc3598b9fa954a791fe99eb0917da15df75207f4c5734596d15e5af2bf0b817795596449f5e088dc6f9421773c36f21430ab7d6e73ba23af976125ff6adb", 0xb0}, {&(0x7f0000000100)="24c2bf946e056496113867f4408a922a2f4cde0c5234bf4bd789d7c1f73c0dd0bc646fba3f6acb8dae02b66822cbf092eef0834b0dc3e02100522ce4bc76a2bedee715798378df71f1c76f3457c91d7610080137ee3a186ef32a2f3909887487f7d878677f03e209e542c2455fffcfe7bdcc1ca4327cac8814f577", 0x7b}, {&(0x7f0000000040)="4966a444e9ffd886134eb1ebab61ad8978ccbdde0729e5962fbbc6f21988e0b794c83e54a58c", 0x26}], 0x3}}], 0x1, 0x2080883) 19:16:52 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200, 0x1, &(0x7f00000005c0)=[{&(0x7f0000000500)="e0597cdbee1204500a6c10923855233e7692c42016a20fb9f58f5318c05333fe5b977886ddf8c46c768ef6e172b53ab5f6549b9467679eb472cae6c387b65624203d6f94ce22273ea3465de74dd351bfd3b80edbe4de14259bf201be392ba19f83ccdaca7995e1bb580501d2bdf3d09e78f3a946d77d555eabaf4984e86b0c861c1616", 0x83, 0xab2}], 0x800049, &(0x7f0000000280)={[{@orlov='orlov', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r4 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r5) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) r8 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) r11 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r12) r13 = timerfd_create(0x0, 0x0) fstat(r13, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(r14, 0x0, 0x0) r15 = gettid() ptrace$setopts(0x4206, r15, 0x0, 0x0) tkill(r15, 0x3b) ptrace$setregs(0xd, r15, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r15, 0x0, 0x0) r16 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r16, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r17) r18 = timerfd_create(0x0, 0x0) fstat(r18, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(r19, 0x0, 0x0) r20 = gettid() ptrace$setopts(0x4206, r20, 0x0, 0x0) tkill(r20, 0x3b) ptrace$setregs(0xd, r20, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r20, 0x0, 0x0) r21 = getpgrp(r20) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r23 = timerfd_create(0x0, 0x0) fstat(r23, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(r24, 0x0, 0x0) sendmsg$netlink(r3, &(0x7f0000000240)={&(0x7f0000000040)=@proc={0x10, 0x0, 0x25dfdbfb, 0x8000000}, 0xc, &(0x7f0000000140)=[{&(0x7f00000002c0)={0xe0, 0x33, 0x400, 0x70bd25, 0x25dfdbfe, "", [@typed={0x8, 0x79, @fd=r0}, @typed={0x8, 0x15, @str='\x00'}, @nested={0x60, 0x2f, [@typed={0x8, 0x89, @uid=r5}, @generic="b651341f9fa33d6183d3adb5cf6ef6702fb9418e0110e2ae74a64771d5c64e55dd5f288ab59b7157f47e1636d973b30ee6a300d4663c96929bdd125a08ea13963743219e7cfd303fab28668d00cf376613af"]}, @generic="fef1e56ef083ffc9ebf0a363fe547f4d20cfec55b56312d63685a741e3a394482806f048c46e1e22c1b78b02fc97e31b058408ee923944c757394c2735c0ae2177b9324cbfc8bec260544182b1b88829d36917780124cde91473e0896ffed7"]}, 0xe0}], 0x1, &(0x7f0000000440)=[@rights={{0x24, 0x1, 0x1, [r2, r7, r8, r10, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r12, r14}}}, @cred={{0x1c, 0x1, 0x2, {r15, r17, r19}}}, @rights={{0x14, 0x1, 0x1, [r11]}}, @cred={{0x1c, 0x1, 0x2, {r21, r22, r24}}}], 0xa0, 0x40080}, 0x40000) [ 862.212569] EXT4-fs (loop5): journaled quota format not specified 19:16:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='\xccf\xd3\xf7\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 862.309226] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 19:16:52 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r5, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) listen(r5, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000140)={@local, @empty=[0x0, 0x4888, 0x0, 0x0, 0x0, 0x1400000000000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @local={0xac, 0x13, 0xffffffffffffffff}, @dev}, @tcp={{0x0, 0x0, 0x42424242, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) r6 = accept$packet(r4, &(0x7f0000000000), &(0x7f0000000040)=0x14) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x20000, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') preadv(r8, &(0x7f0000000700), 0x31f, 0x10400003) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r8, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000180)={&(0x7f00000008c0)=ANY=[@ANYBLOB="b8000000", @ANYRES16=r9, @ANYBLOB="00012dbd7000fcdbdf2510000000e7ff05002c000200080003000000000008000400400000000800010001000000080001002000000008000100010000004c00020008000200060000007e000400010000000800030005000000000635aeddee7a0cd80004000800000008000400000000000800030007010000080003003f0000000800040005000000280004000c00010073797a30000000000c00010073797a31000000000c00010073797a3000000000"], 0xb8}, 0x1, 0x0, 0x0, 0x20000800}, 0x40c) sendmsg$TIPC_NL_MON_PEER_GET(r7, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4b000002}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x94, r9, 0xf6304cc192f0af35, 0x70bd26, 0x25dfdbff, {}, [@TIPC_NLA_NET={0x60, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x921}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x6}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x5}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xff}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x80}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2}]}, @TIPC_NLA_MEDIA={0x20, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x1}, 0x48040) setsockopt$packet_tx_ring(r6, 0x107, 0xd, &(0x7f0000000100)=@req3={0x101, 0x8, 0x1, 0x6, 0x1f200000, 0xffffffff, 0x1ff}, 0x1c) 19:16:52 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="ee0300000000000000000000cd76726ef1aab17daf5da17f65c76e4e859b79c877d43fbbd302b60eddb32d8b83fdb77281b02d5b07"]) r0 = gettid() fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000080)={0x0, r0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) r1 = accept$unix(0xffffffffffffffff, &(0x7f0000000200)=@abs, &(0x7f0000000140)=0x6e) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000280)) sched_getparam(r0, &(0x7f0000000000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 19:16:52 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 862.523093] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 19:16:52 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:52 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = accept$unix(r5, &(0x7f0000000100), &(0x7f0000000040)=0x6e) write$binfmt_aout(r6, &(0x7f00000019c0)={{0x66, 0x20, 0x40, 0x29d, 0x31e, 0x9, 0x9c, 0x1000}, "124f3dc9cdeda245a8bf2abdb7a948c190e6f59ac80fe4c7ae201f6ae4b1432af61514c844d6c57ec97995d946c0105cede6e18112912291e23219fe3e68c2cb8f4ad839837c8ba507246f449fc606022780ffba168c7bad63d5853eef6bca08", [[], [], []]}, 0x380) r7 = dup3(r3, 0xffffffffffffffff, 0x180000) readv(r7, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0xfffffcd6}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4089, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/247, 0xf7}], 0xa) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$NS_GET_OWNER_UID(r9, 0xb704, &(0x7f0000000000)=0x0) r11 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(r10, r12) 19:16:52 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) r6 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 19:16:52 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000140)=0x8) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x3f, &(0x7f0000000000), &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) ioctl$sock_proto_private(r4, 0x89ee, &(0x7f0000000000)="66bbad364c5b9e68a65bb58be4fb9258fdee72c3c8abb7d799deb62c90f98fe3512ccdbd862016cadbd5fea7574057c1d6c99fe6c4573692d676bc") 19:16:52 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r3, 0x401c5504, &(0x7f0000000140)={0x5, {0xfff, 0x0, 0xfffffffa, 0x2, 0x2, 0x10000}}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100)=0x5, 0x4) readv(r4, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x19a}, {&(0x7f0000000000)=""/107, 0x6b}, {&(0x7f0000000300)=""/241, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000000200)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:52 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:52 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000100), 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000140)={r2, 0xc5, 0xcf}, 0x0, &(0x7f0000000200)="2665c72f19759140dfa6493f69413c7491dc40c42777d146355554645d82183f9442495e31a1c1902d862de9ba58d1fffcfa64d89c644ead852bc2d002bfc0dc646ca00370b2c5a5f0bf17307acbba306b409503f9e1ae2babc33715e453a3dc015b1dd4d101d2f96f99f7da55a62be4e6aa36f82efe2d9cc319b9bd61485af05eddc05b1489fb4d3a1c1c0d2bbb6d77af9bb5770b7ac9415ec71bccb4d51868b6fcff8323dd5f970855ee61fe3a3a0cf24cd501bb44602eaa60c92f9bd2e18f3ad960d733", &(0x7f0000000300)=""/207) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r3, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f00000019c0)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001a40)=""/69, 0x45}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 862.804879] EXT4-fs (loop5): journaled quota format not specified [ 862.839902] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" 19:16:53 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f00000019c0)=ANY=[@ANYBLOB="0000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000002000000010100000000000007000000000000000500000000000000000001000000000000008100000000000000000000000000000000000000000003000000090600003affffffffffffff01800000000000005502000000000000080000000000000000000000000000000000000000000000000000000000003c21f1dff5da8b7a430b94c400000000000000000000000000000000000000000000000000000000000000000000000000000000000133a587f1d02eb8de6a0cbfc6734b0d5be42ec45fdb787721974fdbd0ace56f5990c2dd"]) [ 862.868431] EXT4-fs (loop4): journaled quota format not specified [ 862.883148] EXT4-fs (loop5): journaled quota format not specified 19:16:53 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) fgetxattr(r3, &(0x7f0000000100)=@random={'btrfs.', '/\x00'}, &(0x7f0000000200)=""/82, 0x52) ioctl$sock_ifreq(r2, 0x8994, &(0x7f0000000040)={'veth1\x00', @ifru_data=&(0x7f0000000000)="a1b7c167ecbf636a485fabcfb5e507d628941285881079ce8a45bfa4e8ff41db"}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r4, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 862.910550] EXT4-fs (loop4): failed to parse options in superblock: usrjquota=" 19:16:53 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 862.953073] EXT4-fs (loop4): journaled quota format not specified [ 862.981697] EXT4-fs (loop5): journaled quota format not specified [ 862.988151] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" 19:16:53 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 863.017590] EXT4-fs (loop4): journaled quota format not specified [ 863.042756] EXT4-fs (loop4): failed to parse options in superblock: usrjquota=" [ 863.051951] EXT4-fs (loop5): journaled quota format not specified [ 863.081589] EXT4-fs (loop4): journaled quota format not specified 19:16:53 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="7573725357ec6bcfdd6a71365dd96db5c57de89cae7cb9ad8559a0a348e8ea4a367da77dda40b411de25a804c67e062309f643b93d71daaf6a557ba33305201d9c7f"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup(0xffffffffffffffff) flistxattr(0xffffffffffffffff, &(0x7f0000000280)=""/10, 0xa) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x1f, 0x5, 0x2, 0x10000, 0x220, r4, 0x1, [], r5, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r6 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r6, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x50000001}, 0xc, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYBLOB="200000002200340727bd70d0c2fdf2b9bab700fddbdf250907000000000000f011007b09000100"], 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x20008010) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f00000002c0)=0x8000) 19:16:53 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:53 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @local, @multicast1}, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) inotify_init1(0x0) 19:16:53 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000100)={'mangle\x00'}, &(0x7f0000000040)=0x54) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r3, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 863.297472] EXT4-fs (loop4): journaled quota format not specified [ 863.332558] EXT4-fs (loop5): Unrecognized mount option "usrSWģkĻŻjq6]ŁmµÅ}čœ®|¹­…Y £HčźJ6}§}Ś@“Ž%ØĘ~# öC¹=qŚÆjU{£3 œ" or missing value [ 863.338310] EXT4-fs (loop4): failed to parse options in superblock: usrjquota=" 19:16:53 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:53 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:53 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0x82}], 0xa) [ 863.396989] EXT4-fs (loop4): journaled quota format not specified [ 863.453173] EXT4-fs (loop5): Unrecognized mount option "usrSWģkĻŻjq6]ŁmµÅ}čœ®|¹­…Y £HčźJ6}§}Ś@“Ž%ØĘ~# öC¹=qŚÆjU{£3 œ" or missing value [ 863.497105] EXT4-fs (loop4): journaled quota format not specified [ 863.517815] EXT4-fs (loop4): failed to parse options in superblock: usrjquota=" 19:16:53 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 863.559865] EXT4-fs (loop4): journaled quota format not specified 19:16:53 executing program 4: ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x4e22, @multicast1}}) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000000)) r1 = dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TIOCGSID(r5, 0x5429, &(0x7f0000000140)=0x0) ioctl$sock_FIOSETOWN(r3, 0x8901, &(0x7f0000000200)=r6) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:53 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 863.698794] EXT4-fs (loop5): journaled quota format not specified [ 863.722712] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" 19:16:54 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x8) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = dup2(r0, r5) ioctl$TIOCSSOFTCAR(r6, 0x541a, &(0x7f0000000040)=0xff) readv(r3, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x280082, 0x40) write(r7, &(0x7f00000019c0)="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", 0x1000) 19:16:54 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000000000)=""/79, 0x4f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:54 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 863.759103] EXT4-fs (loop5): journaled quota format not specified [ 863.779077] EXT4-fs (loop4): journaled quota format not specified [ 863.801740] EXT4-fs (loop4): failed to parse options in superblock: usrjquota=" 19:16:54 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000000)={0x0, 0x7f}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r4, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000100)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000200)={{{@in=@dev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000040)=0xe8) setsockopt$packet_add_memb(r6, 0x107, 0x1, &(0x7f0000000300)={r7, 0x1, 0x6, @remote}, 0x10) [ 863.838512] EXT4-fs (loop4): journaled quota format not specified [ 863.869770] EXT4-fs (loop5): journaled quota format not specified [ 863.918284] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" [ 863.921862] EXT4-fs (loop4): journaled quota format not specified [ 863.957806] EXT4-fs (loop5): journaled quota format not specified 19:16:54 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 863.959798] EXT4-fs (loop4): failed to parse options in superblock: usrjquota=" 19:16:54 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) listen(r0, 0x9) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) pwrite64(0xffffffffffffffff, &(0x7f0000000200)="02b0cae3d31eee8e045a4518c3432b558b0d06450fa46010abb4e1fbc1496dddcd7011e02320a411e1a05b03a6ca3da66907ecebeb0dcc3a942e293a48daea05a89a33571c3a8fba82e8abaaec95381d7a5ed8aec41604387e0006e55081859aa6676712254e406cfe17f9b963bcc7537f1f3091c88f7a71fa95571a99c3f30756d735135651a2de26769c29f6dd4a1c2efdb131efa3688c657d52315635db5bcc2dd1ac4f607dcbc31ffa39e31e44f7876410901537e7304733a44cb7994e", 0xbf, 0x6) 19:16:54 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$binfmt_aout(r3, &(0x7f00000002c0)={{0x0, 0xfe, 0x40, 0x323, 0x21b, 0x100, 0x44, 0x7}, "3be7e78ea15ecedbce5a3d0ffca6af4539f124b73f", [[], [], []]}, 0x335) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) iopl(0x4) [ 864.025146] EXT4-fs (loop4): journaled quota format not specified 19:16:54 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000200)='.\x00', 0x2, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x3a, 0x400}], 0x800002, &(0x7f00000002c0)=ANY=[]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockname$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000040)=0x14) connect$packet(r3, &(0x7f0000000140)={0x11, 0x17, r6, 0x1, 0x0, 0x6, @dev={[], 0x26}}, 0x14) 19:16:54 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getegid() r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:54 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 864.204923] EXT4-fs (loop4): journaled quota format not specified [ 864.241835] EXT4-fs (loop5): Unsupported filesystem blocksize 0 (1923657432 log_block_size) [ 864.245472] EXT4-fs (loop4): failed to parse options in superblock: usrjquota=" 19:16:54 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 864.344715] EXT4-fs (loop4): journaled quota format not specified [ 864.373290] EXT4-fs (loop5): Unsupported filesystem blocksize 0 (1923657432 log_block_size) 19:16:54 executing program 5: prctl$PR_GET_NO_NEW_PRIVS(0x27) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 864.457826] EXT4-fs (loop4): journaled quota format not specified [ 864.485014] EXT4-fs (loop4): failed to parse options in superblock: usrjquota=" [ 864.529833] EXT4-fs (loop4): journaled quota format not specified [ 864.550800] EXT4-fs (loop5): journaled quota format not specified 19:16:54 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0xed}, {&(0x7f0000000400)=""/111, 0xc}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0xfffffffffffffda2}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) write$smack_current(r2, &(0x7f0000000000)={'!'}, 0x2) 19:16:54 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_AIE_OFF(r2, 0x7002) r3 = dup(r0) removexattr(&(0x7f0000000000)='\x00', &(0x7f0000000040)=@known='trusted.syz\x00') ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r4, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000100)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f00000019c0)=""/270, 0x10e}], 0xa) 19:16:54 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x200001, 0x0, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 864.576357] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" [ 864.596775] EXT4-fs (loop5): journaled quota format not specified 19:16:54 executing program 4: add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000200)="06a982e85e8e87a7ba75a7322f0a78a5735fcfcf08904eff3f783f6e78a3012c1418441d6d42cbe3d8b2ffd7dd", 0x2d, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xaaaaaaaaaaaad70, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000000)={[{@data_journal='data=journal', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:54 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x339a2ed62d21f5a5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r6) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_xfrm(r3, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f00000019c0)=@getae={0x1e8, 0x1f, 0x400, 0x70bd2a, 0x25dfdbfb, {{@in=@rand_addr=0x40, 0x4d3, 0xa, 0xff}, @in=@dev={0xac, 0x14, 0x14, 0x13}, 0x2}, [@algo_aead={0x5c, 0x12, {{'rfc4106-gcm-aesni\x00'}, 0x80, 0x0, "dea83372fea31bcf52291b0e6813393c"}}, @tmpl={0x144, 0x5, [{{@in6=@ipv4={[], [], @empty}, 0x4d5, 0xd8}, 0x2, @in=@empty, 0x3503, 0x3, 0x0, 0x40, 0x7, 0x7ff, 0x7fff}, {{@in=@loopback, 0x4d4, 0xff}, 0x2, @in=@rand_addr=0x40, 0x3505, 0x2, 0x0, 0x2, 0xff, 0x10001, 0x26ce8674}, {{@in6=@remote, 0x4d2, 0xff}, 0x0, @in6=@dev={0xfe, 0x80, [], 0x1f}, 0x3501, 0x0, 0x0, 0x29, 0x2b39f396, 0x800, 0xff}, {{@in6=@empty, 0x4d5, 0x3c}, 0xa, @in6=@mcast1, 0x3504, 0x2, 0x2, 0x1, 0x200, 0x1, 0x1}, {{@in6=@local, 0x4d2, 0x33}, 0x0, @in=@local, 0x3503, 0x0, 0x3, 0xff, 0x7fffffff, 0xb8b3, 0x6}]}, @tfcpad={0x8, 0x16, 0x5aa}]}, 0x1e8}, 0x1, 0x0, 0x0, 0x4000}, 0x543d77386869ace5) ioctl(r3, 0x4, &(0x7f0000000200)="a217113b98265c4d373d6d0b29a752ef0b5eb10e0a4b9426512da037b1280f2ba08b8839d9516a01db79d8d9d8d0a6abaa8f76f9b73fd4e4f48bd49b711d7c978963b7bcac65a51286c3f799d65809c5f7eb5276ba58618361bbeca2da2363ef68e9b796cec18fe0a0f76b9c9448af77e2a1c61b8033c17609e35996ce70f3a2bad4dcc35b000c8a2248285bca1e6f467bae1a4919efee15aaeb66bef19614463311f0d6c8e6941bbbf667d15946ed5c4976cf2eaf5b88594ea086a1c83dbc59b8375c64ef4164a92c10c2e71acfbd67773e3a") ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r7 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r7, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:54 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) write$P9_RLCREATE(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0xf, 0x2, {{0x50, 0x3, 0x2}, 0xffff}}, 0x18) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$LOOP_SET_CAPACITY(r3, 0x4c07) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r4, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 864.702565] EXT4-fs (loop5): journaled quota format not specified [ 864.746255] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" [ 864.785072] EXT4-fs (loop5): journaled quota format not specified 19:16:55 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98d679a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0xe, 0xc46e}], 0x0, &(0x7f0000000040)={[{@noload='noload', 0x22}], [{@fsname={'fsname', 0x3d, 'ext4\x00'}}, {@smackfshat={'smackfshat'}}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:55 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x200001, 0x0, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:55 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:55 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000340)={@remote, @rand_addr, 0x0}, &(0x7f0000000700)=0xc) sendmmsg$inet(r1, &(0x7f0000002440)=[{{&(0x7f0000000100)={0x2, 0x4e22, @loopback}, 0x10, &(0x7f0000001a40)=[{&(0x7f0000000440)="f4f337b6b6db8f5b98c3fee0969fce56fd9fe6c807b9e84156aa0562d8b325515293e9e29887eb7aa9889f47c5a936bbee29c5629c0b79f3eb1ec092471e83144e4a3288abe73140dfbe3eff8f2e", 0x4e}, {0x0}, {&(0x7f0000000780)="9862618128fae4ddc89ba66b93884b5cb1a5761651b338e0312b637bf57a74006ef64033755b841e168f18fb671e456103bf6603968479d941cf032450233af235a7c7587ee3b87c1ba259cea65adebd4e1b8590364bc6ce82f1af11d195118676e5ff8a0feb09f67ea83266c488d1493be0833a23aa6c50ae4263727b04175b438d4134e97113b38570619ce19445cb8782f515357699311a2009972791f2899b05e08ba6007cc2996eb63964e70dce4c72dfa5f38a7fa9a7b571e1d277db922ebe713c86181ee61e32257eb81fb4a07dd6389e185ac85d7303f5141016d0d5a0e10a6bb88bced2d38d1d60aee1d4fbcc2d37645933", 0xf6}, {&(0x7f0000000880)="208edd5c9d4e6dc2213ef5b5321a39768a91b0987f42285231256062bf9ab234c53b8c349a41349e08507c7929665d3283be4d5e8e01607a177ee07b3a04bbd905b8dd5e0329be54efdd2795dea3fded901a36adfc0b6c32156605580d114c73527b372332e4fef20c79a261fadbc600a36acf95ed8a4b3c393d235f18bcafc15f8be762a4c7f522c0cae959f7d0558512c2", 0x92}, {&(0x7f0000000340)}, {&(0x7f0000000a40)="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", 0xfe0}], 0x6, &(0x7f0000001c40)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x3}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @multicast2, @broadcast}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x9a}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @loopback}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @multicast2, @loopback}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xff}}], 0xc0}}, {{0x0, 0x0, &(0x7f0000001f00)}}, {{&(0x7f0000001fc0)={0x2, 0x4e22, @local}, 0x10, &(0x7f0000002200)=[{&(0x7f0000002000)="0164bb1b3cee91d2d23fd07164e71a7801f5084d8bbddc585359319c5af5ff173d56777cbbacaf7a2230a3decfd93551c04a6802ecc89b510747e5a0a2386a08d8adcb6d093332537d945054cbe7622106975a139d6ea1d907c98abd45fd30b082028e3bbd7f4297240740d6e94e6b58f7c9702fed673cfc90a7d126ffefbb22168cda7311efeef208809a6d6f621c0fa2067af03ce38f8205e9988f461be9c70b7d59ff93ff09decf74a9e55430468f15e22cd1fd56879a2f20ab8f1fd80135e9ac1e61f7e87fd6", 0xc8}, {&(0x7f0000002100)="9ded0933fadacbada31ad7b75482074167847b16d8ccdde9b9012cb97c10a85ff942c8f98c1d075f7d5a3367a81d5afc07e162b62f982ed1e7a362fe41e53bcd5d8ddbe0886a755300da5f4ce107c1948f829061f5e99af66c0500003f3296206702616904a1dcba056f1854deba8c64262e5ced27d343", 0x77}, {&(0x7f0000002180)}], 0x3, &(0x7f0000000380)=ANY=[]}}, {{&(0x7f0000002280)={0x2, 0x4e24, @broadcast}, 0x10, &(0x7f0000002400)=[{&(0x7f00000022c0)="247badb355c651b14744280a13c3b8ffcb44beacbfe5f126189e667bcf69a0bc7cb25e2358332fb486915eec8cce7775876b447a45deb35e5b3f8c346e1b008cd8f583159970ca105cd1389d417e87c3383a2b893230e3635eb35502a705832a2d60d7a39dbac94ecca5ffd0da556dcef4ba376eb09519ad2820a60ff79f8a661d", 0x81}, {&(0x7f0000002380)="981176b1f9d40ffae09bf001311558ee3ee0", 0x12}, {&(0x7f0000002540)="7668884946f4985f31ce5a0698abbf12f91e08000000000000feb13b1ca910cb1b9902000000000000006752b125822dd71199ead39298707e7599088f7425077a19ab5b596178f9ab7a27d9cff7fee568927ca35f2a66eb1bd0bb885cc09569eaa8ba7eeeda3603aa8fdebe00d67ff3f2cc5782afbc805626299f0b42eb47f48f0e94404a", 0x85}], 0x3}}], 0x4, 0x140060c4) sendmsg$inet(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000300)="8ff1c11d35efec993ec0ed98bf88a4f4655cea383637d182b3daf5087c29f1bd80938fc96be788f08898c10cc7225f453c1cb3f524f518fc32a1493b0997e1c6833ce7", 0x43}, {&(0x7f0000000380)="441b406cfc14030afa7d45ccd32220578dc0964d75c57c37f8a2c62b5a21fac03d17b8269e90d0f4482b7f475ccf4ba6b783ee908b6fe289cf29cd0fd16f2126326abf0281e0a05853c32893415fe7fc6632269e12940afd3ccd7dfd5ec79464744d13ba089536b62101ea3b2923e2efa38e7a5aaf7df6", 0x77}, {&(0x7f0000000400)="a93c342b5625d0bb4fa343a6c734d3e5cb79f0f595b24f2beb71a30f334d9d697684fc09fbec927b32370161d125cc362ebbca78c667e6d699096e308395fb229b8d812c553fbb8b47029ba5e08b947ca885c98b1028b136b6ce54b5a5e85ac9bab7b62d6b0b0d270dc78dd207023cb5cf5a12198b280bebac7f033acb99cac34ae9bdf544c96f89f30cd7f1403ddd53e479ad64976534ffaea211b887ae4a58a4016b599e55bf85f74af5082956e7301e82374bde1863aa3946b86b319d6c6a62a6aad1945f7a8e7165efd6f2b37a4023a7a3e33aa769ca9520e9d3129039e231fcd636c026433dc029206c2462176ea180fd038f", 0xf5}, {&(0x7f0000000500)="05b0021aa68b330fb4c8a3bd9f88053c2cbbc310e7c4af7195b8ab977e096c8502b1189a190b58f89788160650f3745b5600fcd6949d6d164016", 0x3a}], 0x4, &(0x7f0000000580)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_retopts={{0x88, 0x0, 0x7, {[@rr={0x7, 0x2b, 0x0, [@local, @loopback, @multicast1, @local, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, @multicast1, @broadcast, @multicast2]}, @generic={0x44, 0xb, "82688de41c9d9ba5ca"}, @rr={0x7, 0xb, 0x81, [@multicast2, @loopback]}, @cipso={0x86, 0x36, 0x5, [{0x1, 0x4, 'A_'}, {0x1, 0x10, "5aaaf8d34e2aa2bd8dbf883097b9"}, {0x2, 0xf, "6c45a697e35383ff73bf9c3bd0"}, {0x2, 0xa, "a1916fd7725fed52"}, {0x7, 0x3, 'L'}]}]}}}, @ip_retopts={{0xa0, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffe00}, @ssrr={0x89, 0xf, 0x4, [@multicast1, @dev={0xac, 0x14, 0x14, 0x1a}, @dev={0xac, 0x14, 0x14, 0x16}]}, @rr={0x7, 0x23, 0x32, [@empty, @local, @dev={0xac, 0x14, 0x14, 0xf}, @multicast1, @empty, @rand_addr=0x5f, @initdev={0xac, 0x1e, 0x1, 0x0}, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @ssrr={0x89, 0xb, 0x20, [@empty, @multicast1]}, @ssrr={0x89, 0x17, 0xc9, [@multicast1, @loopback, @dev={0xac, 0x14, 0x14, 0x28}, @empty, @remote]}, @cipso={0x86, 0x33, 0x7, [{0x0, 0x4, "d06a"}, {0xd82f7d24270473c8, 0xe, "25d87cf051283c4de574a3ae"}, {0x5, 0x3, 'X'}, {0x5, 0xc, "bda9c46ca6dd27bdd40c"}, {0x2, 0xa, "966bc887166eab3d"}, {0x1, 0x2}]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr=0x2, @empty}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x3f}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0xff}}, @ip_ttl={{0x14, 0x0, 0x2, 0x200}}], 0x1d8}, 0x808) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='usrj\a\x00oua=\"\x00']) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0xa4) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r5, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100008}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)={0x68, r8, 0x0, 0x70bd27, 0x25dfdbff, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0xfff, @media='udp\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x1}, 0x20004000) r9 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) [ 865.007938] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 19:16:55 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900), 0xa) [ 865.085442] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 865.098767] EXT4-fs (loop4): Unrecognized mount option "usrj" or missing value 19:16:55 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/95, 0x5f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:55 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x200001, 0x0, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 865.139208] EXT4-fs (loop4): failed to parse options in superblock: usrj [ 865.177488] EXT4-fs (loop4): Unrecognized mount option "usrj" or missing value 19:16:55 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/d\xff\x03\x00', 0x8400, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:55 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) statx(r1, &(0x7f0000000040)='./file0\x00', 0x6000, 0x800, &(0x7f00000002c0)) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCGPKT(r3, 0x80045438, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 865.297415] EXT4-fs (loop4): Unrecognized mount option "usrj" or missing value [ 865.324784] EXT4-fs (loop4): failed to parse options in superblock: usrj 19:16:55 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') preadv(r3, &(0x7f0000000700), 0x31f, 0x10400003) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r3, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000180)={&(0x7f00000008c0)=ANY=[@ANYBLOB="b8000000", @ANYRES16=r4, @ANYBLOB="00012dbd7000fcdbdf2510000000e7ff05002c000200080003000000000008000400400000000800010001000000080001002000000008000100010000004c00020008000200060000007e000400010000000800030005000000000635aeddee7a0cd80004000800000008000400000000000800030007010000080003003f0000000800040005000000280004000c00010073797a30000000000c00010073797a31000000000c00010073797a3000000000"], 0xb8}, 0x1, 0x0, 0x0, 0x20000800}, 0x40c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$EVIOCGBITKEY(r6, 0x80404521, &(0x7f00000002c0)=""/88) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0xa0, r4, 0x10, 0x70bd2a, 0x25dfdbfb, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x9}]}, @TIPC_NLA_LINK={0x78, 0x4, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffff10f5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}]}, @TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x40880}, 0xbedaa726824f7a9f) [ 865.343845] EXT4-fs (loop5): journaled quota format not specified 19:16:55 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r4 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r5) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) fstat(r6, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r3, &(0x7f0000000040)='./file0\x00', r5, r7, 0x1000) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 865.373207] EXT4-fs (loop4): Unrecognized mount option "usrj" or missing value [ 865.383426] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" [ 865.431529] EXT4-fs (loop5): journaled quota format not specified 19:16:55 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x200001, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 865.506289] EXT4-fs (loop5): journaled quota format not specified [ 865.524303] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" [ 865.565530] EXT4-fs (loop5): journaled quota format not specified 19:16:55 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='\x00'/12]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/enforce\x1f', 0x101000, 0x0) ioctl$EVIOCGNAME(r2, 0x80404506, &(0x7f00000002c0)=""/4096) r3 = dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VT_WAITACTIVE(r5, 0x5607) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000040)={0x1f, 0x2c, &(0x7f0000000000)="566467a4b72fb597f94efb7ce7d8011612870dc44b93926f7ceaab6452c44c2e9744cd24048fab142855494e"}) r6 = dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) accept4$packet(r8, &(0x7f0000001600)={0x11, 0x0, 0x0}, &(0x7f0000001640)=0x14, 0x80800) bpf$PROG_LOAD(0x5, &(0x7f0000001700)={0xa, 0x8, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffffe}, [@exit, @initr0, @jmp={0x5, 0x0, 0x0, 0xb, 0x5, 0xffffffffffffffe0}, @func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000240)='GPL\x00', 0x81, 0xe, &(0x7f00000012c0)=""/14, 0x82000, 0x2, [], r9, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000001680)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000016c0)={0x2, 0xa, 0xd94, 0x20}, 0x10}, 0x70) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 19:16:55 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x200001, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 865.786016] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (1923657432 log_block_size) 19:16:56 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:56 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3b) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) tkill(r3, 0x1c) 19:16:56 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x7fffffff) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='\xfdl\xa1\x12\x8a_\xf3\f\xb5Z', 0x75247dda944ac9eb, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:56 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2200e5a9e9ac753b534913891b8a3f0509ce91d5f8c997a9b9993eba81ef2bfe57817d75f74c06de433821e1a47f835f797a33a9ef41bb496eb03dfb6a5f4f647d69222affd0b5a564abba0a47b50b31d486cb2e5a9c331308ba45996e7b020d9d"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f00000000c0)={'netdevsim0\x00'}) dup(r0) socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0xfffffffffffffffd}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r4, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept(0xffffffffffffffff, &(0x7f0000000100)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext={0x9, 0xffffffff}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r7, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x9c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5260, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf499, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400]}, 0x45c) ioctl$UI_DEV_SETUP(r7, 0x5501, 0x0) ioctl$UI_DEV_DESTROY(r7, 0x5502) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r7, 0x6612) mkdir(0x0, 0x0) io_submit(0x0, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(0x0, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5b1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r8, 0x0) [ 865.881108] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (1923657432 log_block_size) 19:16:56 executing program 4: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$VT_ACTIVATE(r0, 0x5606, 0x65e7) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="00166ae4fdf7b09293d965ecdcfac7925081720d8de5d054"]) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:56 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x200001, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:56 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$selinux_access(r4, &(0x7f0000000000)={'system_u:object_r:chfn_exec_t:s0', 0x20, 'system_u:system_r:kernel_t:s0', 0x20, 0x7f}, 0x54) dup(r2) ioctl(r2, 0x2, &(0x7f00000019c0)="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") r5 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r5, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 866.047314] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 866.065306] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (1923657432 log_block_size) 19:16:56 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x40) ioctl$EVIOCGPHYS(r0, 0x80404507, &(0x7f0000000200)=""/228) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r4, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x900000]}, 0x45c) ioctl$UI_SET_LEDBIT(r4, 0x40045569, 0x0) ioctl$UI_SET_EVBIT(r4, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r4, 0x5501, 0x0) socket(0x0, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0) keyctl$setperm(0x5, 0x0, 0x202002) socket(0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f00000008c0)={0xffffffffffffffff}) recvfrom$unix(r5, &(0x7f0000000180)=""/93, 0x5d, 0x4000, 0x0, 0x0) socket$inet6(0xa, 0x1, 0x9) r6 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r7, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$FS_IOC_GETVERSION(r9, 0x80087601, &(0x7f0000000100)) [ 866.171079] input: syz1 as /devices/virtual/input/input13 19:16:56 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x3a, 0x400}], 0x804, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 19:16:56 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:56 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 866.332068] EXT4-fs (loop4): journaled quota format not specified [ 866.400711] input: syz1 as /devices/virtual/input/input15 19:16:56 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000240)="03b64798248a788bd7959b18d7efebe7498ebde53c", 0x15) getsockname(r2, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000140)=0x80) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$sock_inet6_tcp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 866.656785] EXT4-fs (loop4): journaled quota format not specified 19:16:56 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 866.705866] EXT4-fs (loop4): failed to parse options in superblock: usrjquota=" 19:16:57 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x100000b, 0x10, r4, 0xff909000) [ 866.756707] EXT4-fs (loop4): journaled quota format not specified [ 866.788590] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 866.859717] input: syz1 as /devices/virtual/input/input16 [ 866.905391] EXT4-fs (loop4): journaled quota format not specified [ 866.950544] EXT4-fs (loop4): failed to parse options in superblock: usrjquota=" 19:16:57 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1400000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x24, r2, 0x0, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x80000000}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x20040003}, 0x6c008018) syz_mount_image$ext4(&(0x7f00000001c0)='\x80\x06\x00', &(0x7f0000000100)='./file0\x00', 0x4, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095747a3b91285b45328802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x3a, 0x200}], 0x804000, &(0x7f0000000280)={[{@usrjquota='u\x01\x00\x00\x00uot\xe1=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) [ 867.016934] EXT4-fs (loop4): journaled quota format not specified 19:16:57 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="7573726a7175534ae8c087ab352200f822"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x891b, &(0x7f0000000140)={'nr0\x00', {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)=@known='trusted.overlay.impure\x00', &(0x7f0000000240)=""/101, 0x65) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) renameat(r1, &(0x7f00000002c0)='./file0\x00', r4, &(0x7f0000000300)='./file0\x00') 19:16:57 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 867.166326] input: syz1 as /devices/virtual/input/input18 [ 867.293568] EXT4-fs (loop4): Unrecognized mount option "usrjquSJ衇«5"" or missing value 19:16:57 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r4, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:57 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 867.422692] EXT4-fs (loop4): Unrecognized mount option "usrjquSJ衇«5"" or missing value 19:16:57 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:57 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000001640)=ANY=[@ANYBLOB="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"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) vmsplice(r3, &(0x7f0000001580)=[{&(0x7f0000000280)="f4da2a288efccc509480a440e0a425a2b0fa9dc5fc62ff912584f6d02c1ba583564bda02cef128870141", 0x2a}, {&(0x7f0000000580)="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", 0x1000}], 0x2, 0x0) getresuid(&(0x7f0000000380), &(0x7f0000000400), &(0x7f0000000300)) setxattr$security_evm(&(0x7f00000002c0)='./file0\x00', &(0x7f00000003c0)='security.evm\x00', &(0x7f0000000440)=@md5={0x1, "a4d2547c40e3f43935adb7a157939343"}, 0x11, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PPPIOCSNPMODE(r1, 0x4008744b, &(0x7f0000000480)={0x80fb}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$NS_GET_OWNER_UID(r5, 0xb704, &(0x7f0000000240)=0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047459, 0x0) quotactl(0x6, &(0x7f0000000200)='./file0\x00', r6, &(0x7f0000000340)="7bc51a9501d8e00c10d0ffb4") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) preadv(r8, &(0x7f0000000140)=[{&(0x7f0000000000)=""/99, 0x63}], 0x1, 0x6) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000015c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r2, r9, &(0x7f0000001600)=0x9, 0x81) 19:16:57 executing program 4: r0 = syz_open_pts(0xffffffffffffffff, 0x10000) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000000)) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x3a, 0x400}], 0x2000, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCNXCL(r2, 0x540d) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) [ 867.635872] EXT4-fs (loop5): Unrecognized mount option "" or missing value 19:16:58 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)={0x9, 0x6, 0x2, 0xffffffff, 0x1a, 0x6, 0x20, 0x7, 0x5, 0x6, 0x4, 0x1}) [ 867.755121] EXT4-fs (loop5): Unrecognized mount option "ōŚ*(ŽüĢP”€¤@ą¤%¢°śÅüb’‘%„öŠ" or missing value [ 867.794423] EXT4-fs (loop5): failed to parse options in superblock: ōŚ*(ŽüĢP”€¤@ą¤%¢°śÅüb’‘%„öŠ 19:16:58 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 867.854592] EXT4-fs (loop5): Unrecognized mount option "" or missing value 19:16:58 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0xfffffffffffffe73, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) open$dir(&(0x7f0000000040)='./file0\x00', 0x10200, 0x40) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x802, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000140)=0x0) syz_open_procfs(r2, &(0x7f0000000200)='net/ip_vs_stats_percpu\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) ioctl$int_out(r3, 0xa8c0, &(0x7f0000000240)) 19:16:58 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5}, 0x1c}}, 0x40805) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 867.933302] EXT4-fs (loop4): journaled quota format not specified [ 867.946386] EXT4-fs (loop4): failed to parse options in superblock: usrjquota=" [ 867.972613] EXT4-fs (loop4): journaled quota format not specified 19:16:58 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) fsetxattr$security_selinux(r1, &(0x7f0000000000)='security.selinux\x00', &(0x7f0000000040)='system_u:object_r:systemd_tmpfiles_exec_t:s0\x00', 0x2d, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_opts(r3, 0x29, 0x39, &(0x7f0000000200)=@hopopts={0x2f, 0x25, [], [@generic={0xcb, 0x78, "fa60ffd71fb415032b86ed1006d06b91bb479433dae4c8e5205b1a40dcb9d5abc7b338a5ec205eac57a91b3d180d9eb173eb60d0ef2d92546e6faae39f03d7925c1a6e2fc1d3d856d0a29ee93beba84dbaf5ae9e465b670287986dea4e3612f5aa9a2670ffa7c3666ab21c474b7b02b28cbbf23ae639742a"}, @calipso={0x7, 0x30, {0xff, 0xa, 0x8, 0x7, [0x8, 0x8, 0x8, 0xffff, 0x4]}}, @generic={0x40, 0x7b, "813f142a07d8d44082352498faf4e50f631be2fa85bb2473c13eeb2a986779a6f79f6634d4546af3ecfc1a914bf599c8d2fef17c8079eede3d42afddc3feebeac86f89a780b536593baea1c1015092dddb995416b64ff3381a0e160305554c28e689e5d284fb761da17713dc3d1de6d1ec6b7ceba65b3747a6ccd4"}, @jumbo]}, 0x138) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r4, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/66, 0x42}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 868.071733] EXT4-fs (loop4): journaled quota format not specified 19:16:58 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0xbf8) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000000)=""/87, 0x57}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) r3 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) lookup_dcookie(0x9c, &(0x7f0000000200)=""/244, 0xf4) fsync(r3) ioctl$KDSETMODE(r1, 0x4b3a, 0x5) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TUNGETSNDBUF(r5, 0x800454d3, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r2) [ 868.104853] audit: type=1400 audit(1574709418.327:55): avc: denied { relabelto } for pid=4492 comm="syz-executor.0" name="UNIX" dev="sockfs" ino=125329 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:systemd_tmpfiles_exec_t:s0 tclass=unix_stream_socket permissive=1 [ 868.139522] EXT4-fs (loop4): failed to parse options in superblock: usrjquota=" [ 868.172644] EXT4-fs (loop4): journaled quota format not specified 19:16:58 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x3a, 0x400}], 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="dd16d0e1bfde761f3f9e6784906dc46019a13f241379b26720f42e8477ab7baa82213c64cae23af5635d323b4302342f3348909022f8c72e4c487fcf40fa961d425b3c6b3c4cdf3ef60e2dbd6481c412d9d12de377522441d6f91a9325edcf6a585e60fd166e4c32ac418b0e7ccf21177a7e663fdd0b06d9244cc2e33ea7174d98d2df9232b2678c143663b79cb377bac7c751b7d48a214ca21d51d4fe783da86ab0af1133fb72040000d4bd262a0d"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:58 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:58 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) getsockopt$sock_timeval(r1, 0x1, 0x5d, &(0x7f0000000100), &(0x7f0000000140)=0x10) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') readv(r3, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 868.344150] EXT4-fs (loop4): Unrecognized mount option "ŻŠįæŽv?žg„mÄ`”?$y²g ō.„w«{Ŗ‚!ö-½dÄŁŃ-ćwR$AÖł“%ķĻjX^`żnL2¬A‹|Ļ!z~f?Ż Ł$LĀć>§M˜Ņߒ2²gŒ6c·œ³wŗĒĒQ·ŌŠ!L¢QŌžx=Øj°Æ3ūr" or missing value [ 868.446302] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 19:16:58 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:58 executing program 3: r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000040)='.\x00', 0xfe) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x80000000) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg(r3, &(0x7f0000002f40)=[{{&(0x7f0000000280)=@tipc=@id={0x1e, 0x3, 0x2, {0x4e21, 0x4}}, 0x80, &(0x7f0000001a80)=[{&(0x7f0000000140)="862333beb223d7538aebaa994f410540a0b56ab029aaf423b8424d70966b", 0x1e}, {&(0x7f0000000300)="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", 0xfa}, {&(0x7f00000019c0)="713b914994231cd99ab10cff02efb4e6349cbe132b948dd6901be5478fd811022f485710db17acecbcfc6a1c4272a62d7262067a7fda9978414b5fe25b92843154938ecbd58b10612a4954e707ef9395ea171f929765311d02fcdd246d53210b41fc71c6eaa69709931013eb57b82b8ed3b72542bb75a130d5cc1c797d915923524123fea8491cf3f5e120b52aaa5d54fd27abeb4cbb837538b3ad816e0766875b20d0c78bde9a8708135723ef07b538b4e7a2a9403601cf", 0xb8}], 0x3, &(0x7f0000001ac0)=[{0x58, 0x10a, 0x2, "b0e4b7e0ed459eafe331c6a22d8b17d25b9e96c6db6d5fd4414d122e979aac542d5f897511c21497a6a2a9e69d91e3683db94ac1b930a13fa09399165e78f6ddf8"}, {0x78, 0x105, 0x1, "173c244fff20d76346f47add489830f18d564599da85dcbe151139a9652d60fc9b3bd43d2f81145c440c6ab1eb115c4b4cf885393932fd70cccb36097baad38972f448f97cff350485e38ba1589e5aa520e443c0e4acec6d1fe892fd1f92597611ba64d5"}, {0xc8, 0x1, 0x0, "87ef56cdc146d5cd965116112de80658e827a6ea305d2c14d7836159ea8176281b0381747d4a60f2ac41b5018dc12afeed501a8a8deab9a172b5f48f3fab9b6a752afd59cf8501ca8893c6744dd1cb224a75fa7e5bf20d8f6d3a56efd0d9777dfd0feb4c782a67b7224c8ce53c7fef6d92cd6492ab3534a8757fa649472c6c1c4ac0fc2161e5671ff0e88dbaf93e15f64ef0a4d5fd93a020690c7a7fde4b0711e31b38fb28a8b817c707d3a68cc075e10c8673"}, {0x1010, 0x0, 0x8, "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"}], 0x11a8}}, {{&(0x7f0000002c80)=@llc={0x1a, 0x30e, 0x7, 0x7, 0x0, 0xd9, @dev={[], 0x1d}}, 0x80, &(0x7f0000002e00)=[{&(0x7f0000002d00)="c8672d6831b20b2063b4f0beb47148496993d6f8a737cca54f9cfb6806f3c526b53fbd6aec7bffdc2787c821ae75c2e188", 0x31}, {&(0x7f0000002d40)="ce81dba29b2f76d18e79dc57e22f751d5da7beeb463cec572be921b21355589d791c8d4e4ea37efc1209064bcc", 0x2d}, {&(0x7f0000002d80)="6569c31aac292944ef5fb92d1c734934ff6a86441ea86882f587f61c01dd6e5a44536a916802123de0be8860c08d9e1ac150105961054c3bc248d487c50fb5d1dc660908fc84b1f5abd22287c33611634ad111b9518d7f64fe649bc84f", 0x5d}], 0x3, &(0x7f0000002e40)=[{0x30, 0x11, 0x3, "3996cf359bdc24d6f9373f5a5426b4b9de71e85ea9ae562b5d620e"}, {0xb0, 0x81, 0x235, "475d2de7c39f8241ed8afa1d38eff1f7e1f1b3008a9a03c92a2b437b2c2bd16e912c8a825c13b220d36f6a2454cbdbc62b470adf94d0eccad9c9e0f595cd728143e9b340bbaa771cd63a65fa56857fbf25eb30a61b521ca6f15ce9a4254c87fb4ee8874536a6851d6da850f9bea7902e0a1e4dcbf174a1767ec3d3aec2596bb5501d17238a3d407bdc806f42303e4bd074f3e0c4989e41e4372a4057dc"}], 0xe0}}], 0x2, 0x20040000) inotify_rm_watch(r0, r2) inotify_rm_watch(0xffffffffffffffff, r2) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='clear_refs\x00') ioctl$GIO_FONT(r4, 0x4b60, &(0x7f0000000200)=""/86) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_genetlink_get_family_id$nbd(&(0x7f0000003000)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r4, &(0x7f00000030c0)={&(0x7f0000002fc0)={0x10, 0x0, 0x0, 0x11}, 0xc, &(0x7f0000003080)={&(0x7f0000003040)={0x2c, r7, 0x8, 0x70bd26, 0x25dfdbfd, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x6}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40000}, 0x4008004) r8 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r8, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 868.571637] EXT4-fs (loop4): Unrecognized mount option "ŻŠįæŽv?žg„mÄ`”?$y²g ō.„w«{Ŗ‚!ö-½dÄŁŃ-ćwR$AÖł“%ķĻjX^`żnL2¬A‹|Ļ!z~f?Ż Ł$LĀć>§M˜Ņߒ2²gŒ6c·œ³wŗĒĒQ·ŌŠ!L¢QŌžx=Øj°Æ3ūr" or missing value 19:16:58 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) fcntl$addseals(r2, 0x409, 0x4) 19:16:58 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x0) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:58 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) open$dir(&(0x7f0000000000)='./file0\x00', 0x34703, 0x80) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:58 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4093, 0xffd}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:59 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1fd) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 868.788292] EXT4-fs (loop5): journaled quota format not specified [ 868.818000] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" 19:16:59 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpgrp(0xffffffffffffffff) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x2, r3}) r4 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000000000)=0x0) prctl$PR_SET_PTRACER(0x59616d61, r5) r6 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r7, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000380)=""/116, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000300)=""/75, 0xfffffd7c}, {&(0x7f0000000580)=""/107, 0xffffffffffffff46}, {&(0x7f0000000600)=""/240, 0xffffffffffffff0b}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000000100)=""/57, 0x39}, {&(0x7f0000000200)=""/236}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 868.852199] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (1923657432 log_block_size) [ 868.864377] EXT4-fs (loop5): journaled quota format not specified 19:16:59 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1fd) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:59 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) r3 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x5, 0x80) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0xc50c2, 0x0) mkdirat(r4, &(0x7f0000000140)='./file0\x00', 0x80) ioctl$EVIOCSKEYCODE(r3, 0x40084504, &(0x7f0000000040)=[0x5, 0x2]) [ 868.945974] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (1923657432 log_block_size) [ 868.963831] EXT4-fs (loop5): journaled quota format not specified [ 868.992111] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" 19:16:59 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="7573726a71756f74613d2210"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:16:59 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1fd) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 869.047593] EXT4-fs (loop5): journaled quota format not specified 19:16:59 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000340)={@remote, @rand_addr, 0x0}, &(0x7f0000000700)=0xc) sendmmsg$inet(r2, &(0x7f0000002440)=[{{&(0x7f0000000100)={0x2, 0x4e22, @loopback}, 0x10, &(0x7f0000001a40)=[{&(0x7f0000000440)="f4f337b6b6db8f5b98c3fee0969fce56fd9fe6c807b9e84156aa0562d8b325515293e9e29887eb7aa9889f47c5a936bbee29c5629c0b79f3eb1ec092471e83144e4a3288abe73140dfbe3eff8f2e", 0x4e}, {0x0}, {&(0x7f0000000780)="9862618128fae4ddc89ba66b93884b5cb1a5761651b338e0312b637bf57a74006ef64033755b841e168f18fb671e456103bf6603968479d941cf032450233af235a7c7587ee3b87c1ba259cea65adebd4e1b8590364bc6ce82f1af11d195118676e5ff8a0feb09f67ea83266c488d1493be0833a23aa6c50ae4263727b04175b438d4134e97113b38570619ce19445cb8782f515357699311a2009972791f2899b05e08ba6007cc2996eb63964e70dce4c72dfa5f38a7fa9a7b571e1d277db922ebe713c86181ee61e32257eb81fb4a07dd6389e185ac85d7303f5141016d0d5a0e10a6bb88bced2d38d1d60aee1d4fbcc2d37645933", 0xf6}, {&(0x7f0000000880)="208edd5c9d4e6dc2213ef5b5321a39768a91b0987f42285231256062bf9ab234c53b8c349a41349e08507c7929665d3283be4d5e8e01607a177ee07b3a04bbd905b8dd5e0329be54efdd2795dea3fded901a36adfc0b6c32156605580d114c73527b372332e4fef20c79a261fadbc600a36acf95ed8a4b3c393d235f18bcafc15f8be762a4c7f522c0cae959f7d0558512c2", 0x92}, {&(0x7f0000000340)}, {&(0x7f0000000a40)="f354b9fa3b2988465ad6bfeaa237ab4f58e4744e82e5dd410d5d4152f9c042605f8c73129342780f355a533472b9c6098b46ad52c0147edadb826507aeef75029179ccb38dd04551e7f8e0eddf51d526f9899c31db90d03aa142b1fc2f16a6d85610ed3bbbe85245d1048a9775f80e6ea787564333a5432978c16ccc94f101d32877b019009271834dffa42c50f0dc7406684a307791a810440e4a6bbedefd321ea85b6b2fcb344128f9186f491ba6256539549f6083cfa2b52866eff508b68a4b1bac02bdafe035a371c32c160c62df6f45d5f5f4f94e9aee209f23a6f2aa01a42d9ef4e59cf4bcf60e91b0b17cef4c696811c05de8ed829f10d8f7b8b8f52f665aba92b0593f11d0bea23fbfe40f1d9e25691f0093379a92ce283b22c5698f4e4af1eef0e3e0b8070d00ab228eadcdac9bc6b035f35b35bff7b9df1cd55e8efead07773b190b4e2f609528f6a5ef9313c45c77591baf006e78cc703e4fec6b7ec27a4bc256cfaa8a442aa1aa7eefbc66691a20c8c1272ef1d31080d6ad3a193b760c4616a030184c1dfcdf3c7f2837129ad098ec3ec6e4f3d942146d301ede8e412ea58b1801d0a037a53980a3ab721a79d89dbdf8db9f5e0a35ad96aaf4e208c8c706580a52e85810db8579ee9efe7cf3dfb85a2216c1a7aa43fbe9d6714e53671e4e433ce0eae164ca6e09083cb17c05f0b19d59f31a4748f7fe7501e65c73d1643b5b823a82c801288410f4974eba2822b440cbc33a4a6b2415225c2a02c16dba01ae00d023747ae8e64be135f825f2b414b9467cbcc6f9711f0b6c979ac6ed183363b3d79208fed114d1217d6459b336cad9a9ecdd6054eacc3b09d7e3e8ccbe97a1e16109d62e626ea7e99f4450f310fc319f97dc08cb962361ecdf4e49da7cad6241d05d884508833a9cb6c560e9c8cc5a947b0b9ab125abcfb182b9b1df4e5d693290aeddd4c72166435718672a730a355b53a3125233d44f267b028307b59385103eaca3e9a2aba5a4199c695f0cfaac9c33caaac5dc70777bc2c7752d0ddf4acba663c04bd793ebc64b77b69e9895e0eb4c25f82ccf884d063a5a5ad871207dd19b1c135fb840191c274b96c771c4bf2b24efab2ef11d8dc77ee36a662ce063200066ac0e983b21853b99489662aefbfd9bbe43149d8fd9f5e3da25c3e79ab0ae0272ca57a9229cfab90003d7ad751c503677a3e0f689cdc751e4bf1346e72418bbbd9b0394a9b04b27750952ecbf2bd97cf3d8ff6a84341079ed8f41e100df11589fea0976b9b10fba8bea108ab1a1be768f5542242458982ab573676103e666e3aa6c2fda1c50bf45957e0d56a7781832fe26a944057152aed5dae27636600406dee73df4dd533ee3e26c9d287d54ad3f3080b46a7858e0bd541276a6229bddb47fe8a6a418f09fb2d46146c6fa1d10b09a3c036044c40aa5dab9e54324ade1bced5d9d654f2cf97955d432752f195871fa26490c4eeb0efe30145dcec9ce12137dff86b46a0b2cc6fbd74a1e87037ae1a811f009821293d38e0166e5a6eadbe77d230e82a79715a75fdf167584f4a3c84abbc1551f2482572dd2671309f856d2ff78cb65067d64160b0ee1c786b2e7530628c018b705da4de9e3c3539ac0fcfcf06ec1e5b56669099ee043559b475ccd1e985c28822649aa80780243ed6578507e8e2756f646d5fd8369aa323aadd34344ff56fb152527a22e623da5f889da22082d8918ebef1096fec9eadea7d5f7e10fa97e6055ca328d2cbce84b8abe250bc8758837a4150fa61e3dda4301b716e94f310d5274ca725863b4b0a32f2cadbf8d6e0324c6871b220d052cef787f0185ce3f9072b575a8fbfc5c89c5fb3f580414e4c8f4b2f304ab688f20577b6602ddbd42dbf72be5cef43c29e4296853a9dda2f3e884f5495d0a892d9afbc5913601dfaaf296cfadd27001375137f2568fbfdca973026f3c4bceedf4432bd2341d457e2e69e9f3cefc4781723bc22ba7b34eff14c1fc3a3c4074968045714e985cba40040b51beaa4a432e62c7dd064949cf9876427ec57ddf4aad5826785f3e9bf0f35f84b124be98babc96af9156526990df479300ac604d9dab804ffcd1d105cdfb07970e4cfc69fe2540abebbeb92e96cc182037126585bd783d479aec4935b5600a9aad903d40c419859fde29689ac0557f0c29a2331008d6710a571c485eace637b209951836f1fcef7b624f7d86df6c0c336ec6f4588a689a840719a87f8885c84e414d93b159bdde3643f2581b82c564e7f4e7ca98a35682f0de477903441aa5532d48ffee38c46f70bea9a74d235e7d0f42c3c826284533ad80504bc78ae626b6c1ed7d3a7be24bc30dfae4489b4505e2d4f52095f81ecb90c3c5a5895b5fef1d430ecd0fcf75fc65eb5c2a7fdadd4f87b2e9d451aa2344d84cd1a912938a59cb61a347d50c1c146b2f70b6119a69bfc48b2e88d5a3c99e5e36443ea56fb9a0604a0586ae36806ed4e9bccdcef63bbced4c75b60507de699546321a874d2f2940a35d5b1005367a8134006599b343876191f4663ac42dc3b7d98cfcacdfc0ac7b214fcad53e6b131603e1f66a67d96f509ef9a6af34bbe7cd2338465f9589eb6c8939f881854650e50fc63fb347fe0e00f2565c39cf97982237fa09416bb4d2b65bbe5923fb570626200af43991b21dca1ab46421fb3df05ee93eab2c1c63eff0c5b76bc42385cef8a8c0a950dc6eae1a69b5f229a30b03a23e73fcc206dd20fc0db9c314d22203f4f9166f822b4f4873128c6cd899fd10f82b7d932c5e84d0e65660bb4452e2757bcaa26169ee3dfd5c3a9def15c2015f403e648efb8fc8d3a8b8592bd05615046089ddf78ca5837a9c9a8746fb44b7c6e0228118880ffa470dacf6bffa336aa6469b907ce91fc371a705203da5bd5e5df3e1739b568d13c738854f8c20f75bdd550e2bf58d8b2654ac27829c6780beba10e7d5e6c4656f707e9d9a62a4d57566d28bdd66dd2cada9237fefbeb6f9c38debd259fbf4145298bb90309620535436764b9f95c997eac0fc598fcf62f96d615e426869a11fc965275f33ea561eebb953ad67c48b9928975eb6b910f52cbe0ad612513f31d5a5bcef68fc664be681414695978f7e876ac515e3d752666a5412e13c731ab39cd1a275bc127aa49c086dcea2d2cbb68adc9312a91f86e389858ff5cc156aeb4f14f4bf4ab8d86bf80dc56c3a23ac294094aba79ed8ef24ee21a6c7252e6653ec95a1bdab68971671411db13c4d01f3665e81f9f680476a1e7842f21845a21073798ed34b4df54ac2d2ca8d64978436bf4dd852670e2530e995b9139a4cd164462c869fb2ae31d3e7ef93a4ccb4a3dcff225dbcf354a069823e0aad04a664b40c55ee4c80daffc4ed7444c2eb38f2af379bb329aff66a5a4e170b0f02484c74894366e14b23640dcd0d83653f38d3d17a8f1a032005e21f1105b9dc8cf4c75a1484952197af3b963c7da3199c5105862fe3a5af46c43635e37ea379419ed8fa325a2121d43dfa4ebd717b32ec30acac65ba9cbd2a213376e28d67570c4dffe71a7acc58ca14e3aa68587e38b67565475afe2f5e743ce17b76fbb004e037e5b2076190b86161edc146f1169fde94b192a23509b44917403013813a482fcf7960773644d85ab2c5994c93f40d957aaf914d71d5c9713a63b84c211209f1f29313ff92f690ac93de7b46edf542f192d977e7c0c92126f8a9768badcfb525e53cb3d747300ab3b34ed3d42885a63d808f84777dfdf46dbe80bd234a682535878e80c2fed439793c1662b52c6c1a3bf7d6d89bdef08e64e88be5cc871d6a3a26fc3941eb0db79e82a9b89478d745b9f3d1f408bea8141156653559c9697672974519d9c89e36dfdce5898919f5ef19d6686fe5f2567bb0a39ff4bb1fd0bd9b55d2cb76cbe2fbf0147752629be014bfd1d89810b2d88212db0a1068722e9089f5a73bec16ee975bda88c8fdb842469b70b56c1dcc777490b3c8581659d35213f8484e6445aac5c6c4bcdd39814fdc1bfa86043c0b49eef7e1964e1fdc89c0220065ffa5423120824aa55cc6118e4d2c9e1bd4a7aa3a94699bb7cd9decb51b7057e5c60c887e7489bd0e1ab7a85f0b0327d8a3115941268bfa1d6d4c161b9eecdf9103fd055148426308428fedd7ccbdb9be4ece9a513c489e6cfff76e4006660d5c1c04227da23c96bb72d45f2bea1fde02fc5b9fa8000b3eec2cf69f25dceb1ea7de49f70b29ef101a53aa9d8c54ae65467db58df24e2c4a3734a09528f838654bf2b34bd4a19f15b06c023e840ff66e274c5a90cf0201d33489571b786d09872ced1da5d470314d71468d0c8ccbe28e7cd71e92c6345c91106b47a13283e4736ae8c63fee4bb18b0185ca918cbf83bfa5ad090002d4e7fa3b9e6aa0d85c2a1ae2a07f08641302db8bffa69d153f368847bffdd5a0a65c63c51c5877156f841250223538639bf6565dfebfb48c94b021ea88fb153cc88bcaee219bf1f18fdb7d8750d956319bd950946a004023b0189b70df74d3cfc283a61b5564a2f6c9bf50cdbde1c42afdcf261ab2ededb13199408443ddcd43a39be60c4620a31551d05c91da448ba95bb45a12c0557c46625d7aa21e5c47eb78e76fcd3d9d12c3c1dc3de6097b89c66c8b43aded600daf64f00e3de6d0a3d939892afa7cf41fa9bf36f3a7683868476e85ab8bc9012e613160db7b34abc5bae5c79782ca0ff683ff6228a8559fbdc8a611411a99853c914b5a4ce350db1dba9fee5080bca59a4f2715568b1b79ebfcf3e95e4c9e394bb5982e02b2f353588b76ee0cebf472d52e9e34dec433d6ec6dfc81e52cc3d59abdb1df3a7f6eefacacf34fbeaf735792069f8cf8704ecda5db038d48a727a3ebcd0c8a6182c35b2244297c6f9eb446890146b17e9a1621a6f3510c2902e267f2f02367db2474681b58949987f3b79fa30821887e0690cc5b41cd61aa00c3ef7faf1878a9ffa33385b23456d1c75ed7701a3242ee7da024ad902edcf0b25d2b75df807b9b8bb4a3ccc60e0bf743a45ca01416714c2b42094d4616cf459dcfdb1f0ac99d39f00207e06853ac71d88268270b4c5007b9c52bb6eea9f5e2ea2c689c4b3265a9a55de2910cf5f14875bb2fae35c9b1a53f969cafbe59b49ebd82fb2aaa46953ca2e6ab48edfdc61de8a3b9b2b8be1f5af0d09927c8bdc35f537900ffa0112db1b5e2c59d20c98d91517365071ea1244a2246addef85d7f50447905e3528a5f31a6794ed07ac2fdc8e611c87b48f8276c0201ccbf364705086f45515bc838cff83d98ebc24c50b5d2465a597c627435b8fe5aadcbb74febf685b26b2c37b943720601a50923cd974fcc9cb5e00e8a96fff9d9f965218c85eb3bc89ffa2133ceb2cdf274f37013d4f8451600223f9ed048596d78ceca953525aa31910dd1ad56f58f080f4cf1e1fcdb8cbd72f071da262e13358eb13c1cadbf322dffae8968c7f325150c172fd619c320883f2b5d286f4cb221e7a9fd97389e35d6c8de1225d8ee8c0f3a76e94784af1bb2a2a5e9e03a3ca5db4ef2b672a952e6e9d21ae3189a9b8e9c95530c8f55462a636f83ff0239d50754a08e43320aa82bd6b0f75378ee089afd63687de6aeff0de914550a67e0ea4d1f644ac363214966205d7d1476fada60555957352454f0fce11a80fafd16932b148458bece36e1961bf5162d41afb526ed0659bf060d9a6add4572ccc4b2b4c1d4a7800cb0163f776f8883", 0xfe0}], 0x6, &(0x7f0000001c40)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x3}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @multicast2, @broadcast}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x9a}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @loopback}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @multicast2, @loopback}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xff}}], 0xc0}}, {{0x0, 0x0, &(0x7f0000001f00)}}, {{&(0x7f0000001fc0)={0x2, 0x4e22, @local}, 0x10, &(0x7f0000002200)=[{&(0x7f0000002000)="0164bb1b3cee91d2d23fd07164e71a7801f5084d8bbddc585359319c5af5ff173d56777cbbacaf7a2230a3decfd93551c04a6802ecc89b510747e5a0a2386a08d8adcb6d093332537d945054cbe7622106975a139d6ea1d907c98abd45fd30b082028e3bbd7f4297240740d6e94e6b58f7c9702fed673cfc90a7d126ffefbb22168cda7311efeef208809a6d6f621c0fa2067af03ce38f8205e9988f461be9c70b7d59ff93ff09decf74a9e55430468f15e22cd1fd56879a2f20ab8f1fd80135e9ac1e61f7e87fd6", 0xc8}, {&(0x7f0000002100)="9ded0933fadacbada31ad7b75482074167847b16d8ccdde9b9012cb97c10a85ff942c8f98c1d075f7d5a3367a81d5afc07e162b62f982ed1e7a362fe41e53bcd5d8ddbe0886a755300da5f4ce107c1948f829061f5e99af66c0500003f3296206702616904a1dcba056f1854deba8c64262e5ced27d343", 0x77}, {&(0x7f0000002180)}], 0x3, &(0x7f0000000380)=ANY=[]}}, {{&(0x7f0000002280)={0x2, 0x4e24, @broadcast}, 0x10, &(0x7f0000002400)=[{&(0x7f00000022c0)="247badb355c651b14744280a13c3b8ffcb44beacbfe5f126189e667bcf69a0bc7cb25e2358332fb486915eec8cce7775876b447a45deb35e5b3f8c346e1b008cd8f583159970ca105cd1389d417e87c3383a2b893230e3635eb35502a705832a2d60d7a39dbac94ecca5ffd0da556dcef4ba376eb09519ad2820a60ff79f8a661d", 0x81}, {&(0x7f0000002380)="981176b1f9d40ffae09bf001311558ee3ee0", 0x12}, {&(0x7f0000002540)="7668884946f4985f31ce5a0698abbf12f91e08000000000000feb13b1ca910cb1b9902000000000000006752b125822dd71199ead39298707e7599088f7425077a19ab5b596178f9ab7a27d9cff7fee568927ca35f2a66eb1bd0bb885cc09569eaa8ba7eeeda3603aa8fdebe00d67ff3f2cc5782afbc805626299f0b42eb47f48f0e94404a", 0x85}], 0x3}}], 0x4, 0x140060c4) sendto$packet(r1, &(0x7f0000000200)="3eec5d2c3ee6d3c3b7f6b90b33660cc954fcfde27d14a6635ff38dceef5f8246d3c465976c2d6283eeb171310c935a0b11d1183aa65237fb442e331a8dd7e2320e8c1032cf06387c117daa0afa7553ba9650eb40a45bccef873a372cbfb353000fcf", 0x62, 0x3080, &(0x7f0000000040)={0x11, 0x18, r3, 0x1, 0x59, 0x6, @remote}, 0x14) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r4, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 19:16:59 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x0) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:59 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/99, 0x63}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f00000019c0)=""/4099, 0x1003}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:16:59 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1fd) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 869.187722] EXT4-fs (loop4): journaled quota format not specified 19:16:59 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) epoll_pwait(r6, &(0x7f0000003500)=[{}, {}, {}, {}, {}], 0x5, 0x8000, &(0x7f0000003540)={0xfffffffffffffffe}, 0x8) sendmmsg(r1, &(0x7f0000003400)=[{{&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2, 0x6}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000200)="26f6ec7fded52b469d8e1d3b783538bc18a301e700349e78381ee127e4942215a8cb90d662b5237fe35cd8a9df13681851491b984e1dfdbc89145ab7aa57636ce9cc5cb2ff54f66d14be0342749f3dda781357c50032b41f10b7a2", 0x5b}, {&(0x7f00000002c0)="2161eb20f46e87f51e1f9a0430fa7489ed72a6793a638587646bf728fae9804cee1479e9c43825a694e7aff4755018f55fca7fa0b3741dfb598d9b682f23417b71289df749ec22", 0x47}, {&(0x7f0000000340)="e49fbf73897dcbdf2385ae1efa36eb5a3ccd452c57092f0306c9566de34253e3efc6d11eb92e55eeed16368e5fdfc43d18098b2c2dbe6049975230f7f6f41e9a1d1c19892058d2bf788c7160a5c153f95f722bf215efdc96a6575fc3068f68711937489185c41d334757d9f18a9e36fd93", 0x71}], 0x3, &(0x7f00000003c0)}}, {{&(0x7f0000000640)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x1, 0x0, 0x3, 0x4, {0xa, 0x4e20, 0x2, @rand_addr="8c51e59cf517d6307173ebe9749508f0", 0xffff}}}, 0x80, &(0x7f00000019c0)=[{&(0x7f00000006c0)="482a7b8361909337885363a3fbaa2494e9699c6e9c2e708b11d3f977239d428161f7b76c4a7b93a312acf6588264f08854afe7eddb965fdce1b67135d0bdc798a105d518e77d67fbf4c06d6a3f60f5c706ef48db3ecf8830cbd414b1aabe97f8e27246647b1c4cb804317ff787fb0c46d0ce942633c6d9e6dda3ddc06edefaf12cabc188a9eef1e547ceea5c4ac1ba42e2a7208e8644b90c59d38dd7ff72aa09ed934cb24f4106e346eea022908fe6235e4006e88dd36744ac082634c310ad7ff6650039d7ac", 0xc6}, {&(0x7f00000007c0)="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", 0x1000}, {&(0x7f00000017c0)="1cc1ec31d7eec5f143deb1722b25fc882ba77bcf1d8ce40e79ca9e09a1fd978c68a8c89e6568c73402a8fd75879ed63f40b77be2caa2db2ff4287a5f0de7deca3640844d04f18771fb63518afc52149a9af7fb0234ffa37581703f311384dc11e307df85c3d987c804e44b1141d72759fd82d87aa118858e0385b3ac5d7f3b21d5c2933f7944aacffe3cf5dcc17706276226dac66b5e5c06256572dbf189212f751e3f9184a00f7052730f4551279a4f3d6be29a4b228cd2365bfb00b59e400701819fbde065d0b219563f8e8606604d56d9f71479c643a9d582994ef3fb890305b46a37d840fe62bbb1", 0xea}, {&(0x7f00000018c0)="775f808912357f36418d0094409cd1eb78535631de0074a56f97944d7e04204a9c3aa734c78e214a6a08f54e32b0aeb59c35c9d0d3da197df240079946a0c3630219c73c4b10089f12e70cc9ac9576e3f0f15fbd0eb552e11af26c80280a6d7023ef1be0d0524000e3257cce3635895c73baf7c6f0b18b", 0x77}, {&(0x7f0000001940)="4b6ccaa5", 0x4}, {&(0x7f0000001980)="2007da6cbe8e798c316ddbadcc0ebec0d86828de4dfa8fda157b801869a32c82fb7706aa8fe22952b4d6177ed4d596dbd3ec33afacf5a06ed33e02231c2e98", 0x3f}], 0x6, &(0x7f0000001a40)=[{0xf8, 0x10c, 0x401, "1b08f4a49d165523cffe2a59aa4f931c0b07f221ce17cc94704363d9fa9c7155ed548bfe9ddbe10a8ae0427e17de0c8e021db27bcbc6bad581b20a5a7d4de44e96046fe812cc30c6ebdb19c99c83c6fd23297c8c933f45f0097fe58e08d29564cbfe6867afb99f8c0a68155d4193ae2cdbd5716935bad80cbf13a0859e6521850ddfe650eec2af4518685bf9a49fab5cd2a8635e6130ff3295aa652abafdd3b071c20e0cddcc022a2ec6d4685a80a860ae59fce59f42c0cf1772c77e150ad3460ab2cc89b0a30b24f641c13316d92354ad94001920a3c0189c6a090aa4fa78768b0b4d32"}, {0xf8, 0x1f1, 0x0, "f543e354af415430b275a6109739c26eeaa7f3795caa3518bc4262f1277590f73b558d2edf5efcf09b4629c7e4615746d81a136115f07933ccf47bed2478a24d68e7e767e38abafd18234c279a0a583e7590235cce8d9336753054ac54f4677ce877ae502598837c9c63307e0d32fc2656da31fee547601c6b2c4cbe40a7cd18524d12eae0dae1a12765d8761d9ff2b14dbd765c37ea5d98fc6d5f70622342e586a669f03a407196d525fe953c61a5a4a22d3fb3a9be1d1d4cab6942d36bed4c9437bb239b0b2f5dfce423ccb9795c3dc1587a60c4b6cd3748247909d4c0abab37"}, {0xe8, 0x11, 0xffff, "f6a1338fd78a32ae68e99a7a272e020acbf877f92d93e66ff26643e2a13d5e95ba409afa8f501e544e7070d37c817d56c83bfb1b15cf2729b9f3d994ab8acf75701fd250d00e464801297397be2f72744481998df12bdfeac5100fa0e1af9cd06d42bb3c25ea8b00b8529244b3a764451a7869ea088281a671ae3e69d5f1c2aa17377b13d0589fb8b48f838f85fe95dac76d6ab9b42b9b579d4d70f62ae99a22b257f994cc2ac9ed68e3bedae1a33dd87473645718f4a91c38f39d6c55713c93e92dc09f6f0573013e94c051b192d48252ae2387bc48"}], 0x2d8}}, {{&(0x7f0000001d40)=@nl=@kern={0x10, 0x0, 0x0, 0x80000000}, 0x80, &(0x7f0000002000)=[{&(0x7f0000001dc0)="aa95fcb649370b336e4e588692861b5162de19c6e63bdb162f7468cc8305c31492d7f22a8b0821afa8fc55ed28088b4c98ba9188065ed9aba88704fa0434fabf4c6188138ed0a1bf3fc7417f1f65d2b36179a55af29a59223c5c2d24897abe7dbc4e2ba84b7e6788d9aecb2e8f8d0d89dc5b7508bebf8d34c1c975bb6a0818325d3d2b94e8baedba850ec5de4fb262869f90d42cdf306bc739554be126b4041f5d64652cb6be2df0a15bfc6753a1528c0941b0b79c", 0xb5}, {&(0x7f0000001e80)="ad576960ed20a0877e1aca1b158a6a41ece34f613c6f1b3fe1fcafb583eb80070b027cae9516ea0387b4e7813c52ae24f118aa66a310d2a46eef959df77ddbf7f0cfbfc5d1a9a8885486a290e55b8f15687453c0c98b4a46c89576d798eb5f700ce56bf87844d3d9c8be1503237f3849769fd78b0e698c697d8312329b22dd47ae3d39b693ccaab88b4c6350a524ab8514eb5b70e851c8317a6ffd9342eccd86e20c81badb5d262a2ec23d5c2829e37d9c4631edd034b29ccb472fd7f851c3057d96d7a22431c09c60678d2371a75a085befcb7f8663", 0xd6}, {&(0x7f0000001f80)="f1239a874efdcf5cc26d5b988f4c5d16efaf297a4fa03e44bbd3a1a962af20352d8c8ee6aa97c29c2c2b71d87274a35d1788f9b8c51de794ddcadda46eba2d79a9fab4e125990b239c801fcf7f2b5764cb87af6ed67ec5bbb266c1c80d80d50c", 0x60}], 0x3, &(0x7f0000002040)=[{0x1010, 0x104, 0x9, "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"}], 0x1010}}, {{&(0x7f0000003080)=@pppol2tpv3in6={0x18, 0x1, {0x0, r4, 0x1, 0x2, 0x3, 0x3, {0xa, 0x4e24, 0x5, @loopback, 0x9}}}, 0x80, &(0x7f0000003100), 0x0, &(0x7f0000003140)=[{0xf8, 0x13e, 0x1, "054965bb4a7e8bbff1e2f35ce125e1153f3aafe145f2dcb33bb17d406de7f47de7a048a05b9eb8384fd3fbe10c8c1e2081480941b7ffc521fb4fb5ed8c679eb58ecd0d3e2148f071f0943baf3799170d796c2299d12add052172ea62e9f31e962b618ab3b169c3a7d2b65035266ad8d477edf9f9a7d00939ecdcea1bfcb3a1780df0b727e5d0cbea7c77354388727684b6583ee350dd84128056f8b674666f3103600298b9ac8f8111e60a87ba01155dd380ae03dbb0b40314bdb0d2b30d266895a2bd6b2baeb4805915865ea5065244c3dfdf6a71061a6e6dccf44dd11cbbcbc128a0cd55a2a10d"}, {0xb0, 0x107, 0x7, "5feef1c234887c7431a7ef3e75eb68ab0074cef538ec363fa4c199501e32b69c4d720354be6f9153d74bfa0f674e41cde0cfc6c903d104b222425212f5d93cf947d760a7b56f521d27112f97fd7e49dc16381cd93125ffa63a20fbd732feb5057dc7632f4110d0f9223da04e57ef574ed97e2d0aa350d270bc750857e341c76aa1d281211d928edad9b0c9b63c14e03f67faa9c07e23e9f93ba8a763"}, {0x108, 0x0, 0x4, "858201fdeb0d864dd8ebbb5beeeed0b145f3b1d61496252af5a4e65f3571aa575e9edd4bf274d6ab3b7429b5e43b00694228f5c6d1c40100a569cf7b4b20b47c6d64f517552746075aa13f054bf87b2bc18eae1d8d954ee7ff168fc9e851ca05e6d0405821f7a68e761127661c44ea4092910e184517373e5d1f42491043ce3fee5a742432ce5d54f80595d6f9595bfbb2de313ee37057c398c059e1480fc2284187162347234234382c2467b5ee94ed3b946f43d7a6a4db5ab5b455b6ba0e604fd926d18fd2c037471ac1c746eeee32f3c45504628263972a06301e710abedf014fb0295cfdd5cbe1100afd70395a6c658abbe63ce7d7bd"}], 0x2b0}}], 0x4, 0x11) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) fcntl$getownex(r7, 0x10, &(0x7f0000003100)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) [ 869.243723] EXT4-fs (loop4): failed to parse options in superblock: usrjquota=" 19:16:59 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f00000019c0)=""/4103, 0x1007}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) r3 = openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/create\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$FICLONE(r3, 0x40049409, r5) 19:16:59 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) write$P9_RFLUSH(r2, &(0x7f0000000040)={0x7, 0x6d, 0x1}, 0x7) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/52, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000100)=""/76, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x2a}, {&(0x7f0000001700)=""/236, 0xfffffffffffffe99}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$RTC_UIE_ON(r4, 0x7003) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x2, 0xfffffedc}, 0xc) [ 869.300102] EXT4-fs (loop4): journaled quota format not specified 19:16:59 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1fd) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 869.350862] EXT4-fs (loop5): journaled quota format not specified [ 869.371400] EXT4-fs (loop4): journaled quota format not specified [ 869.389054] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" [ 869.399772] EXT4-fs (loop4): failed to parse options in superblock: usrjquota=" [ 869.424595] EXT4-fs (loop5): journaled quota format not specified [ 869.432465] EXT4-fs (loop4): journaled quota format not specified 19:16:59 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000200)="1097e26305dad062c469262058387169be78f03097eaeacc567880fe4865561ad0f3b8db5960b6a3221dca13ac03d1756fb9cb1d737fce613a0427c634ba1758c92f11261eccc061114c4b2d930eb426a820ed47a06776e0dadc45be11e8e48188e5afb2320537983dabf1669617371a5ac663c31c369d8b4e884bae626b620e28f512be6b6cc9a20a952ac88910f77d7e4141873c92f621ae32") fsetxattr(0xffffffffffffffff, &(0x7f0000000000)=@known='trusted.overlay.opaque\x00', &(0x7f0000000040)='#\x00', 0x2, 0x1) 19:16:59 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) connect$unix(0xffffffffffffffff, &(0x7f0000000400)=@abs={0x1, 0x0, 0x4e22}, 0x6e) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) ustat(0x800, &(0x7f0000000640)) splice(0xffffffffffffffff, &(0x7f0000000080)=0x7, r2, &(0x7f00000001c0)=0x7fff, 0x6, 0x5) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000001a40)) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r4, &(0x7f0000001f80), 0x0) execveat(r4, &(0x7f0000000000)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000040)='nodev&\x00', &(0x7f0000000100)='#\x00', &(0x7f0000000140)='/dev/zero\x00', &(0x7f0000000200)='@posix_acl_accessuser\x00', &(0x7f0000000240)='/dev/zero\x00', &(0x7f0000000280)='/dev/zero\x00'], &(0x7f0000001a00)=[&(0x7f0000000300)='/dev/zero\x00', &(0x7f0000000340)='/dev/zero\x00', &(0x7f0000000380)='/dev/zero\x00', &(0x7f00000003c0)='\x00', &(0x7f00000019c0)='/dev/zero\x00'], 0x1000) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/commit_pending_bools\x00', 0x1, 0x0) preadv(r5, &(0x7f0000000600)=[{&(0x7f00000004c0)=""/153, 0x99}, {&(0x7f0000000580)=""/63, 0x3f}, {&(0x7f00000005c0)=""/22, 0x16}], 0x3, 0x8) 19:16:59 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1fd) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 869.523366] EXT4-fs (loop5): journaled quota format not specified 19:16:59 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x0) r6 = socket(0x9, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:59 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r2) r3 = timerfd_create(0x0, 0x0) fstat(r3, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(r4, 0x0, 0x0) lchown(&(0x7f0000000000)='./file0\x00', r2, r4) r5 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) [ 869.565160] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" 19:16:59 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000000)=""/54, 0x36}, {&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 869.621947] EXT4-fs (loop5): journaled quota format not specified 19:16:59 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:16:59 executing program 5: r0 = geteuid() syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="02000000", @ANYRESDEC=r0, @ANYBLOB=',smackfstransmute=ext4\x00,\x00']) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$input_event(r2, &(0x7f0000000000)={{0x77359400}, 0x5, 0x1000, 0x1}, 0x18) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 19:17:00 executing program 3: r0 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x30) ioctl$EVIOCGABS2F(r0, 0x8018456f, &(0x7f0000000040)=""/25) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r3, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:17:00 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$sock_void(r2, 0x1, 0x0, 0x0, 0x0) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r4, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) ioctl$KIOCSOUND(r4, 0x4b2f, 0xffffffff) r5 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x10002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x5, 0x70, 0x3, 0x1, 0x8a, 0x1, 0x0, 0x2, 0x88, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x81, 0x0, @perf_config_ext={0x1, 0x3}, 0x11, 0x8, 0x7, 0x5, 0x5, 0x9, 0x4}, r4, 0xe, r5, 0x4) 19:17:00 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:17:00 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x2) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 869.856928] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 19:17:00 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 869.988829] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 870.014220] EXT4-fs (loop4): journaled quota format not specified 19:17:00 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="25bca274769e620aa734fa0095e061fe76463015e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba80315d78600863cd7dcc6740253ef", 0xfffffffffffffdc8, 0x400}], 0x0, &(0x7f0000000200)={[{@nogrpid='nogrpid'}, {@nomblk_io_submit='nomblk_io_submit'}, {@barrier='barrier'}, {@nobh='nobh'}, {@oldalloc='oldalloc'}, {@acl='acl'}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x2}}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 870.052053] EXT4-fs (loop4): failed to parse options in superblock: usrjquota=" [ 870.094538] EXT4-fs (loop4): journaled quota format not specified 19:17:00 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 870.173709] EXT4-fs (loop4): journaled quota format not specified [ 870.189821] EXT4-fs (loop4): failed to parse options in superblock: usrjquota=" [ 870.238660] EXT4-fs (loop4): journaled quota format not specified 19:17:00 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/net/tun\x00', 0x2, 0x0) r4 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r4, 0x2081fd) write$P9_RSETATTR(r4, &(0x7f0000000200)={0x7}, 0x7) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000280)={'\x00\x00\x00\xe6\xff\xff\xff\x00\x00\x00\x00\x00\x02\x00', 0x5002}) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r5 = open(&(0x7f0000000340)='./bus\x00', 0x0, 0x0) sendfile(r2, r5, 0x0, 0x800000000024) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:17:00 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x0, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:17:00 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000000200)=""/249, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0x7) 19:17:00 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) waitid$P_PIDFD(0x3, r1, &(0x7f0000000380), 0x2, &(0x7f0000001b80)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) r6 = socket$netlink(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) write(r8, &(0x7f0000001d80)="4650cc7b036128a3da79e189444e998dae4be88f694471595163668db0ec0a8d8d206b75da12283e8c6d85d3acd1d1408ce7097e6d7e2b0949b2033e5c9569d96b6d90c91f3d855d04b854b8366001918a76070d047b414395353a4f17dffaa1aabdb5d94353b5ae1d00c649c7f87c52e9bc1fa1a77b49fc0f774de5a360f9c3a629f7ae5f06265c2892a35d7a9339eb4b8f368be2314276f879e6d51dc3ceed5e42258fae07c9aafab8fa6e712d772919519d74b0e8ec0b8cfb771a9136550f7a63bac3f4bef37410b8b917634aac2f0bbc10e3b9a24c25ee8490b5842d8e3a790830f648790fd610a42c20de7d3daf1b8c1a", 0xf3) r9 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup(r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) ioctl$GIO_UNISCRNMAP(r11, 0x4b69, &(0x7f0000001d00)=""/125) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000340)={@remote, @rand_addr, 0x0}, &(0x7f0000000700)=0xc) sendmmsg$inet(r12, &(0x7f0000002440)=[{{&(0x7f0000000100)={0x2, 0x4e22, @loopback}, 0x10, &(0x7f0000001a40)=[{&(0x7f0000000440)="f4f337b6b6db8f5b98c3fee0969fce56fd9fe6c807b9e84156aa0562d8b325515293e9e29887eb7aa9889f47c5a936bbee29c5629c0b79f3eb1ec092471e83144e4a3288abe73140dfbe3eff8f2e", 0x4e}, {0x0}, {&(0x7f0000000780)="9862618128fae4ddc89ba66b93884b5cb1a5761651b338e0312b637bf57a74006ef64033755b841e168f18fb671e456103bf6603968479d941cf032450233af235a7c7587ee3b87c1ba259cea65adebd4e1b8590364bc6ce82f1af11d195118676e5ff8a0feb09f67ea83266c488d1493be0833a23aa6c50ae4263727b04175b438d4134e97113b38570619ce19445cb8782f515357699311a2009972791f2899b05e08ba6007cc2996eb63964e70dce4c72dfa5f38a7fa9a7b571e1d277db922ebe713c86181ee61e32257eb81fb4a07dd6389e185ac85d7303f5141016d0d5a0e10a6bb88bced2d38d1d60aee1d4fbcc2d37645933", 0xf6}, {&(0x7f0000000880)="208edd5c9d4e6dc2213ef5b5321a39768a91b0987f42285231256062bf9ab234c53b8c349a41349e08507c7929665d3283be4d5e8e01607a177ee07b3a04bbd905b8dd5e0329be54efdd2795dea3fded901a36adfc0b6c32156605580d114c73527b372332e4fef20c79a261fadbc600a36acf95ed8a4b3c393d235f18bcafc15f8be762a4c7f522c0cae959f7d0558512c2", 0x92}, {&(0x7f0000000340)}, {&(0x7f0000000a40)="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", 0xfe0}], 0x6, &(0x7f0000001c40)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x3}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r13, @multicast2, @broadcast}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x9a}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x56}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r13, @multicast2, @loopback}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xff}}], 0xb8}}, {{0x0, 0x0, &(0x7f0000001f00)}}, {{&(0x7f0000001fc0)={0x2, 0x4e22, @local}, 0x10, &(0x7f0000002200)=[{&(0x7f0000002000)="0164bb1b3cee91d2d23fd07164e71a7801f5084d8bbddc585359319c5af5ff173d56777cbbacaf7a2230a3decfd93551c04a6802ecc89b510747e5a0a2386a08d8adcb6d093332537d945054cbe7622106975a139d6ea1d907c98abd45fd30b082028e3bbd7f4297240740d6e94e6b58f7c9702fed673cfc90a7d126ffefbb22168cda7311efeef208809a6d6f621c0fa2067af03ce38f8205e9988f461be9c70b7d59ff93ff09decf74a9e55430468f15e22cd1fd56879a2f20ab8f1fd80135e9ac1e61f7e87fd6", 0xc8}, {&(0x7f0000002100)="9ded0933fadacbada31ad7b75482074167847b16d8ccdde9b9012cb97c10a85ff942c8f98c1d075f7d5a3367a81d5afc07e162b62f982ed1e7a362fe41e53bcd5d8ddbe0886a755300da5f4ce107c1948f829061f5e99af66c0500003f3296206702616904a1dcba056f1854deba8c64262e5ced27d343", 0x77}, {&(0x7f0000002180)}], 0x3, &(0x7f0000000380)=ANY=[]}}, {{&(0x7f0000002280)={0x2, 0x4e24, @broadcast}, 0x10, &(0x7f0000002400)=[{&(0x7f00000022c0)="247badb355c651b14744280a13c3b8ffcb44beacbfe5f126189e667bcf69a0bc7cb25e2358332fb486915eec8cce7775876b447a45deb35e5b3f8c346e1b008cd8f583159970ca105cd1389d417e87c3383a2b893230e3635eb35502a705832a2d60d7a39dbac94ecca5ffd0da556dcef4ba376eb09519ad2820a60ff79f8a661d", 0x81}, {&(0x7f0000002380)="981176b1f9d40ffae09bf001311558ee3ee0", 0x12}, {&(0x7f0000002540)="7668884946f4985f31ce5a0698abbf12f91e08000000000000feb13b1ca910cb1b9902000000000000006752b125822dd71199ead39298707e7599088f7425077a19ab5b596178f9ab7a27d9cff7fee568927ca35f2a66eb1bd0bb885cc09569eaa8ba7eeeda3603aa8fdebe00d67ff3f2cc5782afbc805626299f0b42eb47f48f0e94404a", 0x85}], 0x3}}], 0x4, 0x140060c4) ioctl$TUNSETIFINDEX(r9, 0x400454da, &(0x7f0000000000)=r13) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r14 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r14, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r1, 0xc0, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0xefe9, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x1, 0x4}, 0x0, 0x0, &(0x7f0000000240)={0x1, 0x6, 0x8, 0xc82}, &(0x7f0000000280)=0x171e3316, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x200}}, 0x10) 19:17:00 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 870.413965] audit: type=1400 audit(1574709420.637:56): avc: denied { ioctl } for pid=4720 comm="syz-executor.3" path="socket:[124637]" dev="sockfs" ino=124637 ioctlcmd=0x8912 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 870.460505] EXT4-fs (loop4): journaled quota format not specified [ 870.494258] EXT4-fs (loop4): failed to parse options in superblock: usrjquota=" [ 870.549048] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 870.555407] EXT4-fs (loop4): journaled quota format not specified 19:17:00 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:17:00 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_generic(r3, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000040)={&(0x7f00000019c0)={0x36c, 0x26, 0x1c, 0x70bd29, 0x25dfdbfc, {0x8}, [@generic="55ba8923b38bf7a0b4610f60e6514594d4a0efcdae656e7edd6adc35f0cc7743b86645bcb45b841c19e55a3c32d0181651e15815530729df92aff14fccff229b5fbcfe1783977ee583e7e0682a8d1ab0692d2f3626e6787d1edf00925010a38cbffeb99dd6d53204aeea06949a79483b317156d1276eaada12a3ebe55b5ffad864ac122a4a77990e530fca265eb261a381fa737786de4203d1eb904bdfa163dab6926d9f8f", @nested={0x88, 0x2b, [@typed={0x8, 0x31, @fd=r0}, @generic="d0b7dd9f7fa9ed1dba81f8de83a404d89f0cc081c48862533f457e525906e2ca3fc23add7ea394abf4f1d316b18b5eae35f1ace5bed3daf6e9031a04ef611908ecc0cdba4e99063f9534154d868d41703ee463374dc8960e4dbdd9df3a542cd07bd737e9bfccdb2f90dd4f724cad8e22059420c04ca7ec823acfe8"]}, @generic="60220d372e9c1e39a73ae04f4c0ce474259bf3043407819c49de7da778a4abb720abc0194cc24ccee7445df858a4376bb23d8e7b8efb0d9a4d911b01a7f6f42fbafd8ee5863c0157983dbeffe733e3ef133115fd21f499aee23e10fa364b1210208470acad3d5089dad07f67fc1adb96997cdff0af8b1ae5efd38e626d437e2114d31d4c5694ee7b24ec598a9a85ac734e43e0ffb17dcef6c59267f56714a6fa458f5c1877d339e5aecacb984eba626956a62e339ef7e976", @generic="99e991a18991fb20d80c6f646cf9f09f5b9813bc16fe5ff868d468e61638829f84f957d751ca14cbb662ce", @typed={0xec, 0x7b, @binary="9d32a01e04c501843141398f975e80b1f4870d41628c91b2d7fe989633a671407205731d63793e12470420a752ad98b51825dbd95c3c256d91099e19580dc68192115fe097ecbdb5f3c366d681a248e82e5af2d2b374e009467686c410d98af72f5ffe9d8ee3b0ad90c529c7c692e163fd1520bd5355acfac2a7791bcffaf189aefec75ea77eb811f666df7a38ba962bcdf0933c4b199f8ca9649571f26928a96d979592c660d1f513c8347498505f339f3ffa89e27b09efdcde8f7568b5c46ced0e7a1a5433582650aadb518c4ef9a186cf9779ad7be41c742e238c772c39af040840004c"}, @nested={0x5c, 0x21, [@typed={0x4, 0xf}, @typed={0x14, 0x8, @ipv6=@ipv4={[], [], @multicast1}}, @typed={0xc, 0x3d, @u64=0x6}, @typed={0x14, 0x7a, @ipv6=@remote}, @generic="b5a3a16ccc143c827bb5f10388", @typed={0x8, 0x5c, @str='+$\x00'}, @typed={0x8, 0x2c, @uid}]}]}, 0x36c}, 0x1, 0x0, 0x0, 0x40000}, 0x4004080) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r4, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 870.707541] EXT4-fs (loop4): journaled quota format not specified [ 870.719095] EXT4-fs (loop4): failed to parse options in superblock: usrjquota=" [ 870.764046] EXT4-fs (loop4): journaled quota format not specified 19:17:01 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x6000) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000000), 0x10000}]) r5 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) r11 = signalfd(r10, &(0x7f0000000300), 0x8) write$binfmt_elf64(r7, &(0x7f0000001d00)={{0x7f, 0x45, 0x4c, 0x46, 0x80, 0x2, 0x5, 0x10, 0x6, 0x3, 0x6, 0x6, 0x36e, 0x40, 0x2f5, 0x4, 0x80, 0x38, 0x1, 0x8a, 0x8001, 0x7}, [{0x5, 0x200, 0x6, 0x8b, 0x5, 0x8, 0x0, 0x8000}, {0x4, 0x8, 0xfffffffffffffffc, 0x3, 0x47ea, 0xfff, 0x9, 0x2}], "6bf82c3792d4c196892dcc", [[], [], [], [], []]}, 0x5bb) r12 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000001a40)='/selinux/policy\x00', 0x0, 0x0) r13 = signalfd(0xffffffffffffffff, &(0x7f0000001ac0)={0x6}, 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r15 = dup(r14) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) syz_genetlink_get_family_id$net_dm(&(0x7f0000001cc0)='NET_DM\x00') io_submit(r4, 0x6, &(0x7f0000001c80)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x2, 0x8, r2, &(0x7f0000000200)="9737a903d75daf118645dbe1cce78ef6e5e63945a53921717d0ae41e90d872e241aa7bdfb1326e92cddfd79b2e31fedb4f522025324c5c5cb87d0adb036822522095245e9f4cdfd58b86d5304e5f076b09fd08c207a9b1d8e56448ea9877db6959e26c26cc45dad7ca7daccf6eda478f8f188530b6e4d0e95954c1e2b1e9403a0fd497ca968bb956f3493422e2986a838c59ab4ef03e0db01f4d44342d7fa26a879766874d5c3d72", 0xa8, 0xfff, 0x0, 0x1, r5}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x400, r7, &(0x7f0000000100)="72746d8d3e1c76ebe026b412a0", 0xd, 0x7fffffff, 0x0, 0x5, r8}, &(0x7f00000019c0)={0x0, 0x0, 0x0, 0x5, 0x4, r11, &(0x7f0000000340)="10e765c5e60db947f0224f18d435faaf09b0d4a9028998af9d133225e455f72ee99c9d58a0de50ba6fdabd797c0d7b803ac3fcca29ab05ab1ab7932b8dd36fe9fc19b52e3f70ed32594ae7f8e2393872c3a810cb68da3f8a770f956e2f80f4e44bcc32c9b5d9675e51428cdd30bba3a094286b920a00bb39c1e79a4855abd0007754ff7ce1d628cbfb1fed6740a905", 0x8f, 0x4, 0x0, 0x2, r1}, &(0x7f0000001a80)={0x0, 0x0, 0x0, 0x6, 0xffff, 0xffffffffffffffff, &(0x7f0000001a00)="824cefcc079db60fb9e39a39fb873622", 0x10, 0xff, 0x0, 0x3, r12}, &(0x7f0000001b80)={0x0, 0x0, 0x0, 0x2, 0x0, r13, &(0x7f0000001b00)="d73e38f20818017f4f18b09b3281b20088d70c41265ef9335f8efdbdd7135db66ff49a327a9f39bff98ff820e76faf470a17ac6be8ea7db6c4fe64ada2008f899da749deb562e7189b18ba022bae258aa023579509332b7a9f217296db55f25d39243af6434bb2b7", 0x68, 0x3}, &(0x7f0000001c40)={0x0, 0x0, 0x0, 0x3, 0x3, r15, &(0x7f0000001bc0)="40cdbb481f7b9574d63a73c76bc16ead799bf480f32bda6211fb2a1af6235b9c97d97e9303b6a56eb8382015b210a98db8dbb0bfb6032879082fc0cd488d3ffb0fb1616f20f242c655cb55c606f20ab99723f6697bba6d8c007f8846275dfeaafb0adec78e4d63dcaa525d4d0b03b2a29d0e626247ebfb2e45537917", 0x7c, 0x0, 0x0, 0x3, r2}]) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:17:01 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000140)=0x0) r1 = gettid() r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3b) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) wait4(r2, &(0x7f0000000200), 0x80000000, 0x0) setpgid(r0, r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) arch_prctl$ARCH_SET_GS(0x1001, &(0x7f0000000000)) r4 = dup(r3) fremovexattr(0xffffffffffffffff, &(0x7f0000000040)=@random={'os2.', 'usrjquota='}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x100000003) 19:17:01 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6ddf02f8e63ba8863cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="3c4cc040706a7a780000001b480e5503000b4e5725c97a57e63fbe452e07303b7413eacaacf94f0eb1183d6e855677d4a6838d536d51473ef3916e22a936ef398549562783c0ff48c7a2e44fed59bbec1900"/97]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_read_part_table(0xb83, 0x2, &(0x7f0000000040)=[{&(0x7f0000000000)="d0666824f26f6853", 0x8, 0x8}, {&(0x7f00000002c0)="6464b0384e89fdbd8a2a343085cc719be50f624dfd9dd0c82e1d9fa266b04c2c995e46ede385d3f4acdbebe03f479d2d06e21304145034c1b50741d6d4918c794d0aa906c5e7cb490825f2137b76bcb266fe70df9f2b966048c1ef7e22d276fd11f0b1cf48d50a4a8b94873f89f475f33e33b3d82a4fb39490ab86b3692cc96533fb234e3336574a792b7369a6eb33e5ab043991b032065863c2ed36eda50e9104e67e46df4aa16cbaa010cc128444a58b53e7b3530c9bb7f95e10fd3e0b3b8a0b6c5d5eada1a1a3961df8ef3b4ead969ca64a64b683a039afa6be1c183e3f34e5298e6efacf1814208af3daa2", 0xed, 0x38}]) r1 = dup(r0) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000140)={'bond_slave_1\x00', 0xc8}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000200), &(0x7f0000000240)=0x8) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x34, 0x0, 0x2, 0x70bd2a, 0x25dfdbfc, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x1e, 0x9, @l2={'eth', 0x3a, 'ip6gre0\x00'}}}}, [""]}, 0x34}, 0x1, 0x0, 0x0, 0x8c6f96f8c90b6a32}, 0x40001) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:17:01 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 870.925828] EXT4-fs (loop5): journaled quota format not specified [ 870.958325] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" [ 870.968763] EXT4-fs (loop4): Unrecognized mount option "0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:17:01 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x0, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:17:01 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:17:01 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x3a, 0x8c5}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) write$selinux_user(r1, &(0x7f0000000040)={'system_u:object_r:scsi_generic_device_t:s0', 0x20, 'unconfined_u\x00'}, 0x38) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:17:01 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 871.271401] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 19:17:01 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) sendmsg$nl_generic(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000040)={&(0x7f00000019c0)={0x2e8, 0x30, 0x200, 0x70bd25, 0x25dfdbff, {0xa}, [@nested={0x2c8, 0x74, [@generic="dc0465bd311d55d560a6bb9bbc12c2f70debe3babd6e4d12b41bd7db8d1bf8f3efc01684e7d20bd30fc1175fc4763823f7e614f678ba1008aaedc670dc00c7ebf29facbb048c3c206faa8bacb84c9e707799214b530e1390b6cc1f8c34d50a6ca8cfdbfed3b335498a4657ef1a6149e66699d7ded7ce2edd5bb247db19f4aba910f7f510e8f875424d0727", @generic="2e8ac45a3a5856b453efef75619637a8785f8f0ab605c3407700329aaa369bb874a1ea88d6ade9f2be603d35ce4da725919ed75a960ebbb88342a9db5155a4110a94b6ac00579bec644a6e31d25a5b1c3a6390cf239f54954e0f54f5f9dd158d4975d5b3c43f4d8ade04301b562d0862702970b5e34ee439b17f2a8f7a81c2ef0dedee3e", @generic="6063a94e771e7cb0419a84ded0e87e01c4f062fa969b0bbc6ef29810f7c31925671877cc47c9c6eb8ba4a7d6d36c19f00d16448c62bd942f30b66866c69daea8f77f888a8c9cc556cc112562e2efa9685e655a0e735b83792107c1af21780bd798cf2186f57c765130267a1ac6d7d902767914af81d8d91c3beb6e613495d66fc1d815c8904e88f5b3112488c8dc346120a676821196c5605d380f6dfc508bf5cf07a18b6de880a3044f9105d71275d7c7285242e3f4f226", @generic="bcdcc9d54d29d960b388b44a0706356b94b8c890d6d2607c56d92aff92edf1fcfa1afdef411a53204eca2104d81b83515857c154edb29df9dd5967df27cdbc37bcc8cb2d19efc2771e6f8affd47af5fa3742b1bfacd40ec7331b923fa66270fa878be3b67745c31f54", @generic="bc0e4d3ce195d7c1f7ab0feca69c51813a0a1c92fdd855ca201eda58b40a7209040dbc926ccb83cfcbfeccdf2f462758d718c41e10469dac18b5711975e64ee99f7115f682c6a660dee36bdfe39d5541ec89541e602fbc4f94137e230176f2b5d9e326de0d0def9963ace148bf543c06", @generic="88bdaa13304275b15c42a29eca9a6bc9e1de48fa233f2b1891e8e35c02e2eceab52adcb6"]}, @typed={0xc, 0x19, @u64=0x7}]}, 0x2e8}, 0x1, 0x0, 0x0, 0x81}, 0x800d) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) [ 871.345983] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 19:17:01 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:17:01 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x8, 0x6, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xce, 0x0, 0x0, 0x0, 0x9}, [@func={0x85, 0x0, 0x1, 0x0, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @func={0x85, 0x0, 0x1, 0x0, 0x3}]}, &(0x7f0000000040)='GPL\x00', 0x3, 0xab, &(0x7f00000002c0)=""/171, 0x61780, 0x932057886c5530ca, [], 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x0, 0xd, 0x2, 0x7fff}, 0x10}, 0x70) fsetxattr$security_selinux(r2, &(0x7f0000000240)='security.selinux\x00', &(0x7f0000000400)='system_u:object_r:devicekit_power_exec_t:s0\x00', 0x2c, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 871.451028] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 19:17:01 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x0, 0xfffffffffffffffd, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:17:01 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:17:01 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x12d, &(0x7f00000000c0), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) getsockopt$IP_VS_SO_GET_TIMEOUT(r2, 0x0, 0x486, &(0x7f0000000140), &(0x7f0000000200)=0xc) r3 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) r6 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) setsockopt$inet_buf(r5, 0x0, 0x27, &(0x7f00000000c0)="29f6f7a756d325c6b673118f95277e52ae7e421610e737b158a588205eb51f3f38f4340fb6b9e79f74843c82ffc2b34f0e4375", 0x33) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000240)={'security\x00', 0xe6, "8cc4b2a9e99ef8c11ac06beaee1aa94a1a49402c7320a766e4177c7c924af02f6201eae3cb6b5b4d92dd4d7aa2c12d2567c4bd900c87934226afa4c0f1e9b382102bda815925552a130a253ff65048a36bc01b03f2db2a404d70b60f2c342b78578a5c4b9d22c3e5bba24434d64976ff927a56b4c50d92bbf0963557410c9420e19cc003f35d862e68a29411eb6a5a3a8773cd02afd081abeb5b5e7523c1f8655297ebc8a7c0e857653dd33c03f86cbd8a64efa4da8b40b439f6787170ccdcaff2a995f556b630925ab9fe3fe8b4ffcfc0a5569527459ebecff8677c552410553c2863e0f6d1"}, &(0x7f0000000080)=0x10a) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r10, &(0x7f0000000040)={0x80000000}) r11 = open(&(0x7f0000000000)='./file0\x00', 0x401c0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r11, 0x2405, r13) 19:17:01 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2010}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x1c, 0x0, 0x4, 0x70bd28, 0x25dfdbfb, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8801}, 0x94) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:17:02 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/247, 0xf7}], 0xa) 19:17:02 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 871.786837] EXT4-fs (loop5): journaled quota format not specified [ 871.814087] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" [ 871.875772] EXT4-fs (loop5): journaled quota format not specified [ 871.903401] audit: type=1400 audit(1574709422.117:57): avc: denied { map } for pid=4842 comm="sh" path="/bin/dash" dev="sda1" ino=1473 scontext=system_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 19:17:02 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00a=\"\x00']) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:17:02 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) r2 = accept4(r1, &(0x7f0000000000)=@generic, &(0x7f0000000100)=0x80, 0x800) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000200)={'tunl0\x00', &(0x7f0000000140)=@ethtool_rxfh={0x46, 0x7f, 0x7ff, 0xfffffe00, 0x8, "e80b03", 0xfffffff9, [0x5, 0x80000001, 0xd1, 0x3, 0x5, 0x2, 0x3]}}) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r4, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0x6) [ 872.003364] EXT4-fs (loop5): journaled quota format not specified [ 872.035885] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" [ 872.065014] EXT4-fs (loop4): Unrecognized mount option " " or missing value [ 872.086007] EXT4-fs (loop5): journaled quota format not specified 19:17:02 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:17:02 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f00000019c0)={{0x3, 0x0, @reserved="8c0057fc5b9d2e7c711edda2ec6ee9d976f071cec854d74ad7659be86aac0877"}, 0x1000, [], "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"}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r2, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x532ad5f5628f8110}, 0xc, &(0x7f0000000040)={&(0x7f0000000100)={0x60, 0x0, 0x800, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x44, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x9}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'caif0\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x800}]}, 0x60}, 0x1, 0x0, 0x0, 0x40}, 0x1) readv(r3, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:17:02 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 872.168758] EXT4-fs (loop4): Unrecognized mount option " " or missing value 19:17:02 executing program 4: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x800, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) socket$inet6(0xa, 0x4, 0x8b) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) clock_settime(0x2, &(0x7f0000000340)) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, 0x0, 0x0) r4 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) ftruncate(r4, 0x2008001) dup3(r5, r4, 0x0) fcntl$setstatus(r4, 0x4, 0x44000) io_setup(0x40000000008, &(0x7f0000000240)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$EBT_SO_GET_INIT_INFO(r2, 0x0, 0x82, &(0x7f00000002c0)={'filter\x00'}, &(0x7f0000000140)=0x78) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r7, 0x894b, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 872.314267] EXT4-fs (loop5): journaled quota format not specified [ 872.336190] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" [ 872.368798] EXT4-fs (loop5): journaled quota format not specified [ 872.386969] EXT4-fs (loop4): journaled quota format not specified [ 872.419987] EXT4-fs (loop4): failed to parse options in superblock: usrjquota=" [ 872.465237] EXT4-fs (loop4): journaled quota format not specified 19:17:02 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0x10}, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', r2) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe304e05d94c028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r2) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r3) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r6 = socket(0x9, 0x0, 0x8) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r8 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r10 = dup2(0xffffffffffffffff, r9) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r10, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r1, r11, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:17:02 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept4$unix(r0, 0x0, &(0x7f0000000000), 0x0) r3 = dup(r1) sync_file_range(r2, 0x5, 0x7f, 0x7) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100), 0xc, &(0x7f0000000140)={&(0x7f0000000200)={0x74, 0x2a, 0x800, 0x70bd2c, 0x25dfdbff, {0x6}, [@generic="250e0db1780901e817295dbbcdaac1cbcc9f2f17236a481c5eaae93a14a7b19256a4f39fbd5ac65b2127cefed14632dcf216bbec50e3589b883a564291cc940e9527cd988be1f3f6174e9e132acbb59782bfa50eae67980dd0cc85079e"]}, 0x74}, 0x1, 0x0, 0x0, 0x10}, 0x0) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r6, 0x5411, &(0x7f0000000040)) readv(r4, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0xe7f}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:17:02 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f0000000200)) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) 19:17:02 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0xaaaaaaaaaaaacbc, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x3a, 0x3fe}], 0x0, &(0x7f0000000000)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) iopl(0x6) 19:17:02 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x800, 0x0) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000200)={0x5, 0x9, 0x6b8, 0x3ff, 0xfffffff9, 0xff, 0x1d94, 0xfff, 0x0, 0x16, 0x9, 0x5, 0x98a, 0x400, &(0x7f0000000100)=""/72, 0xb0, 0x1, 0x2}) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r3, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 19:17:03 executing program 5: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000280)={[{@usrjquota='usrjquota=', 0x22}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) 19:17:03 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x2c3e1d0931e7f9b6, 0xa, 0x2, &(0x7f0000000200)={0xffffffffffffffff}) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$sock_timeval(r3, 0x1, 0x42, &(0x7f0000000240), &(0x7f0000000280)=0x10) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) r5 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x20, &(0x7f0000000140)=0x73fcaeab8e04b982, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) faccessat(r7, &(0x7f00000002c0)='./file0\x00', 0x0, 0xd00) fsetxattr(r5, &(0x7f0000000040)=ANY=[@ANYBLOB='user.#em0@wlan0cgroupselfvboxnet1jelinux\x00'], &(0x7f0000000100)='\x00', 0x1, 0x1) readv(r4, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) mremap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000, 0x2, &(0x7f0000ffb000/0x2000)=nil) 19:17:03 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f0000000200)) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 872.961843] EXT4-fs (loop5): journaled quota format not specified [ 872.993878] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" 19:17:03 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) ioctl$UI_SET_SNDBIT(r1, 0x4004556a, 0x6) [ 873.025579] EXT4-fs (loop5): journaled quota format not specified [ 873.056898] EXT4-fs (loop4): journaled quota format not specified [ 873.064889] EXT4-fs (loop4): failed to parse options in superblock: usrjquota=" [ 873.103090] EXT4-fs (loop4): journaled quota format not specified [ 873.145629] EXT4-fs (loop5): journaled quota format not specified [ 873.168983] EXT4-fs (loop5): failed to parse options in superblock: usrjquota=" 19:17:03 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x200001, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f0000000200)) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40", 0x3b, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000540)={'\x00', 0x0}, 0x0, 0x0, r1) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x1, @local, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, 0x0, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x70bd26}, 0x1c}}, 0x40805) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="56b66889a5f2b7a5cce38fb26044e1cbf2a0843d7d192491135da8bd687ea6c10581a6f882d2773cf89c2401d991df64aa02bc3cc61de95736e5c2b27ae5c19d26372e86dee884a2de5139ba909cdc84ec0a1c97c8468c35d54165e19078dde454e4a720ff3808ac6a12c1af354e79f0befed9cfc94aee1d7142e1b9033db8c42ec971e4bde89114ea49f34f4fa815d5ecb8f1d6247a7010db190676a19b4192ddfc97e87cd6"], 0x1}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14007009096e1e99f96581750000b5e73c120a3fd079f0c850900ad280bd1a6fc8be84b22a3a3497c0dd7f0deda1b76fd26e6264da53334bb8117179f9ad3f13390d9414c5e9aecec30df1eb6f884737d7aabdf0b6251f3a23defe3b5763235fda73e35cc351146bacf08be2e0cbfcecc51fb641"], 0x14}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x184) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') r5 = dup2(0xffffffffffffffff, r4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000680)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) sendfile(0xffffffffffffffff, r6, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @broadcast}, 0x4e24, 0x0, 0xfffd, 0x0, 0xa, 0x0, 0x20}, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x6}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 873.214635] EXT4-fs (loop5): journaled quota format not specified