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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r3}, 0x10) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r4, 0x0) [ 987.451974][T28789] EXT4-fs (loop1): bad geometry: block count 620 exceeds size of device (525 blocks) [ 987.463599][T28792] EXT4-fs (loop5): error: could not find journal device path: error -2 07:21:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000027202000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:21:42 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) r2 = syz_open_dev$vcsa(&(0x7f0000000440), 0x0, 0x0) fsetxattr$trusted_overlay_upper(r2, &(0x7f0000000000), 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000080)) bpf$ITER_CREATE(0x21, &(0x7f00000001c0), 0x8) bind$tipc(r1, &(0x7f0000000200)=@name={0x1e, 0x2, 0x0, {{0x43, 0x3}, 0x3}}, 0x10) 07:21:42 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000000014000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:21:42 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca00c2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab5d362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6c33ac7f7e58f57cb6c37e89f0e036126b592ecb1c4e841590662b9aaabd775c5"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r3}, 0x10) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r4, 0x0) 07:21:42 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000280)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000000240)='bond0\x00', 0x0, 0x3, 0x68}) 07:21:42 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab59362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6c33ac7f7e58f57cb6c37e89f0e036126b592ecb1c4e841590662b9aaabd775c5"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r3}, 0x10) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r4, 0x0) 07:21:42 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) r2 = syz_open_dev$vcsa(&(0x7f0000000440), 0x0, 0x0) fsetxattr$trusted_overlay_upper(r2, &(0x7f0000000000), 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000080)) bind$tipc(r1, &(0x7f0000000200)=@name={0x1e, 0x2, 0x0, {{0x43, 0x3}, 0x3}}, 0x10) 07:21:42 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000280)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000000240)='bond0\x00', 0x0, 0x3, 0x68}) 07:21:42 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = syz_open_dev$vcsa(&(0x7f0000000440), 0x0, 0x0) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000000), 0x0, 0x0, 0x0) bind$tipc(r0, &(0x7f0000000200)=@name={0x1e, 0x2, 0x0, {{0x43, 0x3}, 0x3}}, 0x10) [ 987.627816][T28812] EXT4-fs (loop1): bad geometry: block count 626 exceeds size of device (525 blocks) [ 987.645916][T28815] EXT4-fs (loop5): error: could not find journal device path: error -2 07:21:42 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab59362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6c33ac7f7e58f57cb6c37e89f0e036126b592ecb1c4e841590662b9aaabd775c5"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca00c2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab5d362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6c33ac7f7e58f57cb6c37e89f0e036126b592ecb1c4e841590662b9aaabd775c5"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r3}, 0x10) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r4, 0x0) 07:21:42 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) syz_open_dev$vcsa(&(0x7f0000000440), 0x0, 0x0) bind$tipc(r0, &(0x7f0000000200)=@name={0x1e, 0x2, 0x0, {{0x43, 0x3}, 0x3}}, 0x10) 07:21:42 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000000018000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) [ 987.760452][T28812] EXT4-fs (loop1): bad geometry: block count 626 exceeds size of device (525 blocks) 07:21:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000007402000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:21:42 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000280)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x13c, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)='bond0\x00', 0x0, 0x3, 0x68}) 07:21:42 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca00c2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab5d362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6c33ac7f7e58f57cb6c37e89f0e036126b592ecb1c4e841590662b9aaabd775c5"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:42 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) bind$tipc(r0, &(0x7f0000000200)=@name={0x1e, 0x2, 0x0, {{0x43, 0x3}, 0x3}}, 0x10) 07:21:42 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000280)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x13c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x68}) 07:21:42 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$tipc(r0, &(0x7f0000000200)=@name={0x1e, 0x2, 0x0, {{0x43, 0x3}, 0x3}}, 0x10) [ 987.870328][T28835] EXT4-fs (loop5): error: could not find journal device path: error -2 07:21:42 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca00c2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab5d362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6c33ac7f7e58f57cb6c37e89f0e036126b592ecb1c4e841590662b9aaabd775c5"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:42 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000000024000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) [ 987.914838][T28843] EXT4-fs (loop1): bad geometry: block count 628 exceeds size of device (525 blocks) 07:21:42 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$tipc(r0, &(0x7f0000000200)=@name={0x1e, 0x2, 0x0, {{0x43, 0x3}, 0x3}}, 0x10) 07:21:42 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000280)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x13c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x68}) 07:21:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000037602000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:21:42 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:42 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000280)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x13c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x68}) 07:21:42 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$tipc(r0, &(0x7f0000000200)=@name={0x1e, 0x2, 0x0, {{0x43, 0x3}, 0x3}}, 0x10) [ 988.053886][T28856] EXT4-fs (loop5): error: could not find journal device path: error -2 [ 988.091137][T28861] EXT4-fs (loop1): bad geometry: block count 630 exceeds size of device (525 blocks) 07:21:42 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab59362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6c33ac7f7e58f57cb6c37e89f0e036126b592ecb1c4e841590662b9aaabd775c5"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) 07:21:42 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) bind$tipc(0xffffffffffffffff, &(0x7f0000000200)=@name={0x1e, 0x2, 0x0, {{0x43, 0x3}, 0x3}}, 0x10) 07:21:42 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f00000001000000000000002e000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:21:42 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000280)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x13c, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)='bond0\x00', 0x0, 0x0, 0x68}) 07:21:42 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) 07:21:42 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) bind$tipc(0xffffffffffffffff, &(0x7f0000000200)=@name={0x1e, 0x2, 0x0, {{0x43, 0x3}, 0x3}}, 0x10) 07:21:42 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) 07:21:42 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) bind$tipc(0xffffffffffffffff, &(0x7f0000000200)=@name={0x1e, 0x2, 0x0, {{0x43, 0x3}, 0x3}}, 0x10) [ 988.232718][T28861] EXT4-fs (loop1): bad geometry: block count 630 exceeds size of device (525 blocks) 07:21:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000017702000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:21:42 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000280)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0x13c, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)='bond0\x00'}) 07:21:42 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) bind$tipc(r0, &(0x7f0000000200)=@name={0x1e, 0x2, 0x0, {{0x43, 0x3}, 0x3}}, 0x10) 07:21:42 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f00000001000000000000003f000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:21:42 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r3}, 0x10) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r4, 0x0) 07:21:42 executing program 2: ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) [ 988.323774][T28886] EXT4-fs (loop5): error: could not find journal device path: error -2 07:21:42 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000003c0)="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", 0x11e}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000000)={[], [{@smackfsfloor={'smackfsfloor', 0x3d, 'vfat\x00'}}, {@uid_gt={'uid>', 0xee00}}]}) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x7ff, 0x1, 0xe6, 0x7}, {0x0, 0x81, 0x25, 0xaa}, {0x1f, 0x1f, 0xa3, 0x8}, {0x1, 0x26, 0x5, 0x2}]}) preadv(r1, &(0x7f0000000340)=[{&(0x7f0000000140)=""/122, 0x7a}, {&(0x7f00000001c0)=""/61, 0x3d}, {&(0x7f0000000280)=""/182, 0xb6}], 0x3, 0x2, 0xc7) r2 = openat$incfs(r0, &(0x7f0000000380)='.pending_reads\x00', 0x2602, 0x40) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r3, 0xc0182101, &(0x7f0000000100)={r4}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000140)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r3, 0xc0182101, &(0x7f00000001c0)={r5}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000500)={r5, 0x3, 0x8}) r6 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r6, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r6, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r6, 0x4004af61, &(0x7f0000000540)=0x1) 07:21:42 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) bind$tipc(r0, &(0x7f0000000200)=@name={0x1e, 0x2, 0x0, {{0x43, 0x3}, 0x3}}, 0x10) 07:21:42 executing program 2: ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca00c2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab5d362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6c33ac7f7e58f57cb6c37e89f0e036126b592ecb1c4e841590662b9aaabd775c5"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) 07:21:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000007a02000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 988.411955][T28901] EXT4-fs (loop1): bad geometry: block count 631 exceeds size of device (525 blocks) 07:21:43 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) bind$tipc(r0, &(0x7f0000000200)=@name={0x1e, 0x2, 0x0, {{0x43, 0x3}, 0x3}}, 0x10) 07:21:43 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab59362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6c33ac7f7e58f57cb6c37e89f0e036126b592ecb1c4e841590662b9aaabd775c5"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca00c2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab5d362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6c33ac7f7e58f57cb6c37e89f0e036126b592ecb1c4e841590662b9aaabd775c5"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r3}, 0x10) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r4, 0x0) [ 988.477814][T28913] FAT-fs (loop4): Unrecognized mount option "smackfsfloor=vfat" or missing value [ 988.488123][T28911] EXT4-fs (loop5): error: could not find journal device path: error -2 07:21:43 executing program 2: ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) 07:21:43 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000000040000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:21:43 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) bind$tipc(0xffffffffffffffff, &(0x7f0000000200)=@name={0x1e, 0x2, 0x0, {{0x43, 0x3}, 0x3}}, 0x10) 07:21:43 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:43 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) bind$tipc(0xffffffffffffffff, &(0x7f0000000200)=@name={0x1e, 0x2, 0x0, {{0x43, 0x3}, 0x3}}, 0x10) [ 988.601108][T28923] EXT4-fs (loop1): bad geometry: block count 634 exceeds size of device (525 blocks) [ 988.603418][ T22] kauditd_printk_skb: 57 callbacks suppressed [ 988.603426][ T22] audit: type=1326 audit(1621927303.096:232): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28905 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7fc00000 07:21:43 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r3}, 0x10) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r4, 0x0) [ 988.694543][ T22] audit: type=1326 audit(1621927303.096:233): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28905 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7fc00000 [ 988.724398][T28913] FAT-fs (loop4): Unrecognized mount option "smackfsfloor=vfat" or missing value [ 988.747473][T28923] EXT4-fs (loop1): bad geometry: block count 634 exceeds size of device (525 blocks) [ 988.750109][T28939] EXT4-fs (loop5): error: could not find journal device path: error -2 [ 988.766686][ T22] audit: type=1326 audit(1621927303.096:234): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28905 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7fc00000 [ 988.818379][ T22] audit: type=1326 audit(1621927303.096:235): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28905 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7fc00000 [ 988.846677][ T22] audit: type=1326 audit(1621927303.096:236): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28905 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7fc00000 [ 988.902751][ T22] audit: type=1326 audit(1621927303.096:237): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28905 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7fc00000 [ 988.927529][ T22] audit: type=1326 audit(1621927303.096:238): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28905 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7fc00000 [ 988.953653][ T22] audit: type=1326 audit(1621927303.096:239): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28905 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7fc00000 07:21:43 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="3e94df694c4301e2757702d3d17f2495a4612993deb53a8fed8a35c7487dc440efbd24e0291e00d4ade48bd131afca1a4dae5326cf430153141584b95cc539761130b942dfc4ed6893bda90dd699808692adc2dc27e2028ec848c9b20746f4282b67ea5ff03911dfb23610fd0b336fcd092097f0b4ad9e41624ed7a099aed426e2732cb53a251d9ac076ed1064c4b2d47aee94f9c744fbffe4bc2d7a15663847e026cf67a44150c7099500000000000000"]) 07:21:43 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) bind$tipc(0xffffffffffffffff, &(0x7f0000000200)=@name={0x1e, 0x2, 0x0, {{0x43, 0x3}, 0x3}}, 0x10) 07:21:43 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000027c02000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:21:43 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r3}, 0x10) listen(0xffffffffffffffff, 0x0) 07:21:43 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000000064000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) [ 988.980972][ T22] audit: type=1326 audit(1621927303.096:240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28905 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7fc00000 [ 989.012289][ T22] audit: type=1326 audit(1621927303.096:241): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28905 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7fc00000 07:21:43 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) bind$tipc(r0, &(0x7f0000000200)=@name={0x1e, 0x2, 0x0, {{0x43, 0x3}, 0x3}}, 0x10) 07:21:43 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r3}, 0x10) listen(0xffffffffffffffff, 0x0) 07:21:43 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:43 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) bind$tipc(r0, &(0x7f0000000200)=@name={0x1e, 0x2, 0x0, {{0x43, 0x3}, 0x3}}, 0x10) 07:21:43 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0d786d80939f72ce236c74041b0cfbdc3a2ab31d752c6e386106c0004ed0d34b7f46608a27a7a5377ec29ee85d1aa8c917a40a6b85246ac238d59856052586c34391cbb43075ce303fc7563cab8bb31cf3f84bcdb0219f63c2cd8b9066284d2db567d408dadc76c1b111c78a88f2984185b77416cc2a4111a8ac055e43361a6a44d62a37c01b57e471c8c8ff46dd814944c42195c92a56907c5a283ade42c116bbea1f85f47d3d10"]) 07:21:43 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca00c2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab5d362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6c33ac7f7e58f57cb6c37e89f0e036126b592ecb1c4e841590662b9aaabd775c5"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r3}, 0x10) listen(0xffffffffffffffff, 0x0) [ 989.126838][T28974] FAT-fs (loop4): Unrecognized mount option ">iLCuw$a)޵:5H}@$)" or missing value 07:21:43 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab59362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6c33ac7f7e58f57cb6c37e89f0e036126b592ecb1c4e841590662b9aaabd775c5"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) 07:21:43 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) bind$tipc(r0, &(0x7f0000000200)=@name={0x1e, 0x2, 0x0, {{0x43, 0x3}, 0x3}}, 0x10) [ 989.207234][T28975] EXT4-fs (loop5): error: could not find journal device path: error -2 [ 989.216204][T28972] EXT4-fs (loop1): bad geometry: block count 636 exceeds size of device (525 blocks) 07:21:43 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) [ 989.330544][T28972] EXT4-fs (loop1): bad geometry: block count 636 exceeds size of device (525 blocks) [ 989.336068][T28991] FAT-fs (loop4): Unrecognized mount option "xmr#lt :*u" or missing value 07:21:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000027d02000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:21:43 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:43 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000000383000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:21:43 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x0) bind$tipc(r0, &(0x7f0000000200)=@name={0x1e, 0x2, 0x0, {{0x43, 0x3}, 0x3}}, 0x10) 07:21:43 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) 07:21:43 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x0) bind$tipc(r0, &(0x7f0000000200)=@name={0x1e, 0x2, 0x0, {{0x43, 0x3}, 0x3}}, 0x10) 07:21:43 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab59362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6c33ac7f7e58f57cb6c37e89f0e036126b592ecb1c4e841590662b9aaabd775c5"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca00c2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab5d362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6c33ac7f7e58f57cb6c37e89f0e036126b592ecb1c4e841590662b9aaabd775c5"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:44 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0xbdd84000) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000000)={'nat\x00'}, &(0x7f0000000240)=0x54) preadv(r1, &(0x7f0000000280), 0x0, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)) 07:21:44 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab59362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6c33ac7f7e58f57cb6c37e89f0e036126b592ecb1c4e841590662b9aaabd775c5"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) 07:21:44 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x0) bind$tipc(r0, &(0x7f0000000200)=@name={0x1e, 0x2, 0x0, {{0x43, 0x3}, 0x3}}, 0x10) [ 989.477846][T29008] EXT4-fs (loop5): error: could not find journal device path: error -2 07:21:44 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca00c2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab5d362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6c33ac7f7e58f57cb6c37e89f0e036126b592ecb1c4e841590662b9aaabd775c5"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:44 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="00863168c530d22df635d64989a0a3acc37453b123f372d00588065cf51f98a2da1ec65c003c4330ea82ab724c9413d82147de206496b0140e8b8a66baa4c20bd9459f04aa1b21d6083e3d638d121a88b88b45b0a8d62ae26cf404e2393959e205f2b431a6051081d81509c46827adaedeb5910e084cd8cc99e2cbcd48c75961b14d5bcd2e1f581ee4597bfc72b097d4f7c042728ae233ad22a5d8ad601e10b666fcc3fd69928253780bcacc897ac9608d5f756ec911a60167e1ba08306ca7bbc8cd1f29923341eb70f87d95895cd0279cbd0a36ea628ce27292"]) [ 989.587872][T29016] EXT4-fs (loop1): bad geometry: block count 637 exceeds size of device (525 blocks) [ 989.676421][T29038] FAT-fs (loop4): Directory bread(block 6) failed [ 989.686088][T29016] EXT4-fs (loop1): bad geometry: block count 637 exceeds size of device (525 blocks) 07:21:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000028802000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:21:44 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000000384000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:21:44 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) 07:21:44 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) bind$tipc(0xffffffffffffffff, &(0x7f0000000200)=@name={0x1e, 0x2, 0x0, {{0x43, 0x3}, 0x3}}, 0x10) 07:21:44 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:44 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f000056b000/0x4000)=nil, 0x4000, 0x3800002, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000280)={{{@in6, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@empty}}, &(0x7f0000000180)=0xe8) mount$overlay(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140), 0x2000000, &(0x7f0000000380)={[{@nfs_export_off}, {@redirect_dir={'redirect_dir', 0x3d, './file0'}}, {@redirect_dir={'redirect_dir', 0x3d, './file0'}}, {@xino_auto}, {@default_permissions}, {@nfs_export_on}, {@metacopy_on}, {@default_permissions}, {@xino_off}], [{@euid_lt={'euid<', r1}}, {@obj_user={'obj_user', 0x3d, 'vfat\x00'}}, {@dont_hash}, {@context={'context', 0x3d, 'staff_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)) creat(&(0x7f0000000000)='./file0\x00', 0x8) 07:21:44 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) bind$tipc(0xffffffffffffffff, &(0x7f0000000200)=@name={0x1e, 0x2, 0x0, {{0x43, 0x3}, 0x3}}, 0x10) 07:21:44 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) 07:21:44 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) [ 989.924624][T29051] EXT4-fs (loop5): error: could not find journal device path: error -2 [ 989.941263][T29055] FAT-fs (loop4): Directory bread(block 6) failed 07:21:44 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:44 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) bind$tipc(0xffffffffffffffff, &(0x7f0000000200)=@name={0x1e, 0x2, 0x0, {{0x43, 0x3}, 0x3}}, 0x10) 07:21:44 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f00000001000000000000038a000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) [ 989.990011][T29062] EXT4-fs (loop1): bad geometry: block count 648 exceeds size of device (525 blocks) [ 990.028733][T29073] overlayfs: unrecognized mount option "euid<00000000000000000000" or missing value 07:21:44 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:44 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)) open(&(0x7f0000000000)='./file0\x00', 0x24001, 0x110) 07:21:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="20000003a602000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:21:44 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:44 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) bind$tipc(r0, 0x0, 0x0) [ 990.070981][T29062] EXT4-fs (loop1): bad geometry: block count 648 exceeds size of device (525 blocks) 07:21:44 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:44 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) bind$tipc(r0, 0x0, 0x0) 07:21:44 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:44 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:44 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) 07:21:44 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) bind$tipc(r0, 0x0, 0x0) [ 990.178857][T29083] EXT4-fs (loop5): error: could not find journal device path: error -2 [ 990.209432][T29101] FAT-fs (loop4): Directory bread(block 6) failed 07:21:44 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f00000001000000000000039d000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:21:44 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/54, 0x36}], 0x1, 0xc1, 0xf) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='\x00']) 07:21:44 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) [ 990.267869][T29107] EXT4-fs (loop1): bad geometry: block count 678 exceeds size of device (525 blocks) 07:21:44 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) [ 990.391114][T29107] EXT4-fs (loop1): bad geometry: block count 678 exceeds size of device (525 blocks) 07:21:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="20000002a802000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:21:44 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) bind$tipc(r0, &(0x7f0000000200)=@name={0x1e, 0x2, 0x0, {{0x0, 0x3}, 0x3}}, 0x10) 07:21:44 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:44 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) 07:21:45 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="5dd804"]) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) openat(r1, &(0x7f0000000000)='./file0\x00', 0x39b900, 0x8) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x101400, 0x0) mmap(&(0x7f00005e4000/0x1000)=nil, 0x1000, 0x3000002, 0x4000010, r2, 0xa281d000) [ 990.461324][T29128] FAT-fs (loop4): Directory bread(block 6) failed [ 990.496866][T29130] EXT4-fs (loop5): error: could not find journal device path: error -2 07:21:45 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:45 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) 07:21:45 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) bind$tipc(r0, &(0x7f0000000200)=@name={0x1e, 0x2, 0x0, {{}, 0x3}}, 0x10) 07:21:45 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f00000001000000000000039e000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:21:45 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab59362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6c33ac7f7e58f57cb6c37e89f0e036126b592ecb1c4e841590662b9aaabd775c5"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:45 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) bind$tipc(r0, &(0x7f0000000200)=@name, 0x10) [ 990.606210][T29142] EXT4-fs (loop1): bad geometry: block count 680 exceeds size of device (525 blocks) 07:21:45 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) 07:21:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="20000003b402000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:21:45 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca00c2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab5d362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6c33ac7f7e58f57cb6c37e89f0e036126b592ecb1c4e841590662b9aaabd775c5"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:45 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab59362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6c33ac7f7e58f57cb6c37e89f0e036126b592ecb1c4e841590662b9aaabd775c5"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) [ 990.662466][T29156] FAT-fs (loop4): Unrecognized mount option "]" or missing value [ 990.670854][T29142] EXT4-fs (loop1): bad geometry: block count 680 exceeds size of device (525 blocks) 07:21:45 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) openat(r1, &(0x7f0000000080)='./file0\x00', 0x0, 0x46) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0xee01, r3, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000040)={[], [{@smackfstransmute={'smackfstransmute', 0x3d, 'vfat\x00'}}, {@fowner_eq={'fowner', 0x3d, r3}}]}) 07:21:45 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:45 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000003c0)="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", 0x11e}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000000)={[], [{@smackfsfloor={'smackfsfloor', 0x3d, 'vfat\x00'}}, {@uid_gt={'uid>', 0xee00}}]}) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x7ff, 0x1, 0xe6, 0x7}, {0x0, 0x81, 0x25, 0xaa}, {0x1f, 0x1f, 0xa3, 0x8}, {0x1, 0x26, 0x5, 0x2}]}) preadv(r1, &(0x7f0000000340)=[{&(0x7f0000000140)=""/122, 0x7a}, {&(0x7f00000001c0)=""/61, 0x3d}, {&(0x7f0000000280)=""/182, 0xb6}], 0x3, 0x2, 0xc7) r2 = openat$incfs(r0, &(0x7f0000000380)='.pending_reads\x00', 0x2602, 0x40) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r3, 0xc0182101, &(0x7f0000000100)={r4}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000140)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r3, 0xc0182101, &(0x7f00000001c0)={r5}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000500)={r5, 0x3, 0x8}) r6 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r6, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r6, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r6, 0x4004af61, &(0x7f0000000540)=0x1) 07:21:45 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) 07:21:45 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) [ 990.790717][T29157] EXT4-fs (loop5): error: could not find journal device path: error -2 [ 990.821767][T29177] EXT4-fs (loop1): bad geometry: block count 692 exceeds size of device (525 blocks) 07:21:45 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f00000001000000000000039f000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:21:45 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca00c2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab5d362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6c33ac7f7e58f57cb6c37e89f0e036126b592ecb1c4e841590662b9aaabd775c5"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="20000003c102000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:21:45 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab59362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6c33ac7f7e58f57cb6c37e89f0e036126b592ecb1c4e841590662b9aaabd775c5"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:45 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) [ 990.900973][T29187] FAT-fs (loop4): Unrecognized mount option "smackfstransmute=vfat" or missing value 07:21:45 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) sendmsg$NL80211_CMD_SET_PMK(r1, &(0x7f00000005c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000580)={&(0x7f0000000180)=ANY=[@ANYBLOB="e3a30000", @ANYRES16=0x0, @ANYBLOB="00012abd7000ffdbdf257b00000008000300", @ANYRES32=0x0, @ANYBLOB="1400020189348ebc400a9864682962554f3d8d61"], 0x30}}, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0xcb, 0x78, 0xfc, 0x1, 0xffffffffffff0000, 0x2, 0x3, 0x101, 0xe3, 0x40, 0xac, 0x5, 0x101, 0x38, 0x2, 0x6, 0xc}, [{0x10000006, 0x100, 0x0, 0x5, 0x7, 0x4, 0x470, 0x7f6a}, {0x4, 0x5, 0x20000000000000b, 0x401, 0x9, 0x100000000, 0x2, 0x6}], "255c720af9156a1070b9eec8f053e25bf7c89ee5f7d42b7db5db88241a0b5f90841fae2df046fdec147f2cb9b7", ['\x00', '\x00']}, 0x2dd) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)) openat(r0, &(0x7f0000000040)='\x00', 0x2f4400, 0x0) 07:21:45 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) [ 990.977254][T29196] EXT4-fs (loop5): error: could not find journal device path: error -2 [ 990.990444][T29198] EXT4-fs (loop1): bad geometry: block count 705 exceeds size of device (525 blocks) 07:21:45 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:45 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f0000000100000000000003a0000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) [ 991.101450][T29209] FAT-fs (loop4): Directory bread(block 6) failed [ 991.101466][T29198] EXT4-fs (loop1): bad geometry: block count 705 exceeds size of device (525 blocks) [ 991.133345][T29219] EXT4-fs (loop5): error: could not find journal device path: error -2 07:21:46 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000003c0)="eb3c908000db013f04f93189ac3bae4612797b8bfdb878cecd3783b29fe17fdafdd3badc9a117904abbc4af117fd8c1a3e7ce3965076dccd3ef1a0ba838bd2d60e20ce940938377e9444ba54bc8c0e00d8a46f55e575d22ed65070834f88104b0d4e43c8e93c6c393762655c8ca7a865cef5aba2bc74a8f61517e4af5ad65d798d1556e52f6c85c7441ecfd9c3627b7367da5fb5ef8b122a64e11d1b26aed963dc12a40bf052a1cbdc06c577b6933a64ab671004242fdc078b82bcfae766a4a06215f3ba903bf6ccc14afc609b05316d3c60a8da9e192a8fd84cdd73072b08285143312b681a0105901c406adc3fc51aba8f1c1d140be25a691e5de77920b2f65484b7e725b31e9c6afa218b87f8d3c4dfa440594613ae10829c856c6e52", 0x11e}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000000)={[], [{@smackfsfloor={'smackfsfloor', 0x3d, 'vfat\x00'}}, {@uid_gt={'uid>', 0xee00}}]}) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x7ff, 0x1, 0xe6, 0x7}, {0x0, 0x81, 0x25, 0xaa}, {0x1f, 0x1f, 0xa3, 0x8}, {0x1, 0x26, 0x5, 0x2}]}) preadv(r1, &(0x7f0000000340)=[{&(0x7f0000000140)=""/122, 0x7a}, {&(0x7f00000001c0)=""/61, 0x3d}, {&(0x7f0000000280)=""/182, 0xb6}], 0x3, 0x2, 0xc7) r2 = openat$incfs(r0, &(0x7f0000000380)='.pending_reads\x00', 0x2602, 0x40) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r3, 0xc0182101, &(0x7f0000000100)={r4}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000140)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r3, 0xc0182101, &(0x7f00000001c0)={r5}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000500)={r5, 0x3, 0x8}) r6 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r6, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r6, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r6, 0x4004af61, &(0x7f0000000540)=0x1) 07:21:46 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca00c2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab5d362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6c33ac7f7e58f57cb6c37e89f0e036126b592ecb1c4e841590662b9aaabd775c5"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:46 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040), 0x0, 0x7fffffff, 0x100) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000280)={{0x0, 0x5, 0xfe, 0x1bf, 0xfc, 0x20, 0x18c, 0xb8b}, "", ['\x00']}, 0x120) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000000)={0x0, 0x6, 0x1, 0x0, 0x0, [{{r0}, 0x7fffffff}]}) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)) 07:21:46 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="20000003c602000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:21:46 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f0000000100000000000003a1000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:21:46 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:46 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:46 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) [ 991.743342][T29233] EXT4-fs (loop1): bad geometry: block count 710 exceeds size of device (525 blocks) [ 991.764152][T29235] EXT4-fs (loop5): error: could not find journal device path: error -2 [ 991.774284][T29236] FAT-fs (loop4): Directory bread(block 6) failed 07:21:46 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:46 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:46 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000000)={'nat\x00'}, &(0x7f0000000240)=0x54) mmap(&(0x7f00004ec000/0x3000)=nil, 0x3000, 0x2000008, 0x40030, r0, 0x2439a000) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$BTRFS_IOC_RM_DEV_V2(r1, 0x5000943a, &(0x7f0000000280)={{r2}, 0x0, 0x0, @inherit={0x60, &(0x7f0000000000)={0x0, 0x3, 0xffff, 0x100000001, {0x20, 0x8, 0x7ff, 0x0, 0x6e53}, [0x100000001, 0x7f7b10a9, 0x9]}}, @subvolid=0xd5c9}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000025c0)={'erspan0\x00', &(0x7f0000002500)={'syztnl1\x00', 0x0, 0x700, 0x7, 0x0, 0x5, {{0x1b, 0x4, 0x0, 0x2, 0x6c, 0x66, 0x0, 0x9, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @private=0xa010101, {[@timestamp_prespec={0x44, 0x44, 0x24, 0x3, 0x3, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x324}, {@multicast2, 0x2}, {@dev={0xac, 0x14, 0x14, 0x25}, 0x7fffffff}, {@remote, 0x1}, {@local, 0x9}, {@loopback, 0x1}, {@multicast2}, {@dev={0xac, 0x14, 0x14, 0x1b}, 0x1}]}, @timestamp_addr={0x44, 0x14, 0x2f, 0x1, 0x3, [{@multicast2, 0x1000}, {@private=0xa010100, 0x9}]}]}}}}}) unlink(&(0x7f0000002600)='./file0\x00') pwritev2(r0, &(0x7f0000000080)=[{&(0x7f0000001280)="3f6f4a3a94193286dadaab8a2c1e90591b4c4caedfc4b4bb118ff46297cdb0ebaf2e51f63c82a63e9280d2f8668f10f7e8f055e3150b6c292c5b846bd7327d7faa8a0ad846379eb307c3fd1dd14e8b86002fed4d21d5a2c7849e6bf9bb9f913145ce211ce2f89853fb4ca609d4e48bbe42426396bff848d73df5196928f1ae1a4499ee4717d050cefa6e8a79b01cdbc77cbd13ec4a942a84d3bb15ecaa341ed978a35ec5118f7994327bf14aac5dca940c39b0d00777ce59bd097b50d56bcf7fbc9844efb41fc566d395ad345d3fbb84507017d968385d5b9dafc407d16c60b902cb275b32a318408369484f21ca75a2b4fb167dc9892e0e122ca2c199", 0xfd}, {&(0x7f0000001380)="27709a0f39077ab23723229433b902a276cd49eac3e6b7a5c7793fe2e7091316ecccb5c6670f0e1c1bcb6fda7b7a149aae5c3e9bd8a415fa35c130635814a71a7051afc2154fe574aaadd08744edbf2c469231c87a3060a482a9aa42329bea1b4df2a62ffd9e4919c7bf778792152310e0e98897d3d283790525c6cfc6f53d0e7693a8c21481ccc1bfffcba62dbf8b4c5304122fec803e18a0d9b6d1cfbc5934fa5b248a1aa4da631f2875ac7d2464638d72b64b2c1ef76a50d3993b9a3675b2504faf51003c8b0ff8c6df5ad273eb5e01f433f2347511387e1d9b50693d23848126363ac92a0acd5ce53cc057dda6c03b0d8adf475f1661835bc6eee0877c7e3dbc30358b567190be8b8d3004484cac459d0dc08feef3e31b5c9d2425663abc08fe90d4f47fd5a1b7603d742cf35e76239d11c6e36190c2064783ba94147ed996eafff9b0b469d6387a81b5b771872912873709c9513ec2249d585e5345ebff9c91ccc5e1adb73b7e2d33d661c2f505689aa185f3b15a5aa8bb210e554200d33e31e0c5197a1016fad81e2c5ed7ec26fecb77bdce81abf81c446ba2d9ab3f36d75edc58668b3345db9ef687205a435a64e8a84560bd6c5f018a22314c0e56a932ae8f9844c572f3b7f7dd6d1f26f5b7f5b3e66f4a4813c905112f074b818d2ff8f03b4ac385430ba609974c6c44049f42941380cff4aedd8872d1e7f575b71f6499d29c6fc0f348dd74a6734baa1b88b7ed8c38ad5aaf2f9a39db629bd3c80944898cc2df5455c679c990fb63e1eb8a2c20d7f80c51da72507b670ee08dac61424bf84469fba2132b4f97a4850ab732d5ad68c983dfc37c03da3b1ad79eb4ae9aac967110430475e546318c1755e861cde57c8fab98537eb5be101bdf74d9e1d21d61099502ce752517969c8969dcaf2f7dcdb9692f7446d72b3b764106f15c78ad8e8c0cb4f655a6edccaf9099d785c908265789c72fb6ef85e029230b75914d0a18a5e4a9d6331e7812b4466f1e3793ba46626bc83e77187dc6a4635d346b4b9e75fbf1160ad3c9d0b85dc7d6cde1340b1f28ca019de4e55cdb6609c679fffa661f2d24a957ce06fe1e4e0b59d844911ae5ffbb662b441c77af41aac15d6cd7673f8c74396aa8f57a93aed58632c9fd777cc037f18cd4e41519f93887656cb1635ba123171e37578d3cbfec874de86ecc2b3fa3805d266ff23d772c0188f4ee05e2f31ff46f8207900b3f63244af94ca76d2560042720d1836a57f25112f15f5eb9700f81390adef2323d0e3debfc7fe3e3446b25c4d5bca8d22ab1074373992f777d6dd306adc059e0f3e8c83003e4b0b757de4b761af2fe4c1ff57b99731795ce07054002aee4235b41ec1811dd2bee900c573e037eee408767f647425d6973805fdd7cde385036aa257b4f833337c25c437c9c0f261834739108060da53f106386b3fe477882dbe4fbc04d20dde8a3ac7fea9009595829306b5d62030af321b329c42d59e23bf9e5cf679f79531fbed689d588026fb92481df2f63b62bb939c23f467bfd33dd7c62853e3d27a701c4e32a96d2f5a7a929743134a3a6b28140699a0096c83a9a16658922488940e27b3e904ecf230abbe3f2a6132b2d8f83d8694d7ab5cba0e9627ece38dddc3f123757c6c1eaf48a86460013cabb9e2d4878284d400d38ef24534d57346939182001f8fa5c314f0987fc73b8919c77cab07b21c89ae2c05c60248b6375dddd665993257aa058bfb76cf43e3bb6c5fae3fa8df7250e26b3299584dd10d1d3f672da362cea8f52c3b6638badeb2b6dacfbe1c54e68f772f2b614e4e4032be08cd6ae6668ed4de3b537fd6205080736de6ee700499029c0c327d26bdd76da7b9996c539841ff203a57260029e482c9c0bc4f194b9c7a0df5bcc3f728248b6fd44ea36d9618d41e35fe290b8e26c4cb83d220e21f208d4eda0fba6c878808a0de838cd663f24002cdae4b24a57104a80b461a72107b3cab87718844f91c82d46f52b070099a13e0789b0b6035cb7569d4a8da26dd87adde0214b17c205ed9a17a30dfa73b8cbcd9e33a8e261ca7a58bd5e281e03f517efccb35799923cd6dcdc96c3711da081cdc10292dfcb7b7db587ce3dc5120335fbda639eaa9f314d79a1c27ac7ded2624ad2fb70d268af8f18144690a152b39abd95ff840f447f95b45b7191ac981c2cb46e8ce5b56004d97fc453a36c7c6e6e2e4f91995a59a4f12018140a5c770da1cf2d3fb26859d2d4be1dd8020a4699619bd13bf5a90a281a98afcf43864dd83564b0067401b2048b4fc3a384fb9a5f148b895be1bd74b4a3b96d9525c5baa1dc99dd47f925d633d5e28e17dc5a819003515a0e16de9719bfb0c3d3d3207dabdd3bcd27313d062ec12be471af64c940df1c3b3a672c19899bf57d454c5286986f4cd288ca758cf43a9041ca254d630db96296d9cebe47ebedc2e2fd40a35c9343e712d66f3a8b3950020a6b1a9cdb6a1b379862ecf45e9ab45a92c7e0741cd9c51fef65eae5abb2fb0918cf0af3ef2b137083c21fc31fbfe4f8512c6692994d10cb0d9e868083fd10322b25210ccd61b70f74cbed0a40c479b75d2bad3792f60fc7ed07fe8d99945ab71bfb0f97549c1bc78356d537466aa3a8b490b338363028b35e879f8157f6538744abb009d5b6d0a757661b58e5b62f6bdb9951ea6487adf741c05943c37cbbda98db7d260e4bca9d5c051a64024d0e507b25dd16dea08306f6cd6e187cdf465bbb88c568d9454cbd979967a3c04ee5be70cfa889c65681c27b1dcb1f0f85d55332a0536e448e6d5dedce2e93ee0c7f47797a978c8d880ee53d7a8b191658356d7744a562ab105dfc5e2b5bbecc536797f836721a357ca822c14818f05016f052a520694e4d96b6a6403b7caceb984d13ad25ca7dabbbf9b1a42ba4818e9918a1577a4a6a87b13cdc7e643719bd5ad9ecc9ee973fad4f2e781206aab886bd7a01859af0bf3ac7f2e92a8cb19ebfe60dfc7996c2ed69b7e7eec2f3283de6d582b7ee453105ecd0edbdb2e297e400edabaff8d6574925026a3f333d1c7b5dbe35f3bf7f06cd58d2b5fc89da1ab2e8b59dd3eea238f433af1bf8dc0f6e7436d70b2c297e2f23af403b5442ec7779409777f52bff0f13410faafdc30b9a1aa74b9ea861f4ca42e8dae20b1e5ddb40d3b23f42e858650e0f21274ba4e6f305c6c3ee0d5f55d4191d91da69f353592233d508f9414b64230e894b2a238f6961ed8d7f4b08a79a3b5b1598e45c2874317aeb0b6e97f172f0e7bce3892e0bb109a125298fddd2722d8b641d8f8b73eaec6c7b5cfb9f981ea7fdcb994eb3ed9fc3530d5ce458e48b73a9c887c6dafefa09533a180dc8660f0c9900e6e24f14715c50baef25cc8489b2197c276ab0e2b648fdcaced4e455d7cb52fc9cfb5c39631ae21120d6d51ae225abdd12df0a20475c40d675921e6cb698c46799a3048868b447426cb9cffe3a8c914f779e4eb246b4deda7fbfbcdcb76553d8f49adbe26dcf6f941ebca1dc08e5ca11b60264df647fd0d7b67942b2df2fc995d223cb77a09ebd8e8dd71e657f745adabe8450bf4af652d5146a323c6cb3b9a098d137626cd6027931c48207b43e695b46e2c48b3329b0d24cef1bb1306191dcd81401284783b7503e3d0eeb5fb77e551ad1575d9f9f15206ca209755f00b699495a09178c0044a2e9d43f44facab75bc7f77a0fac6c17bba4541acaffc0ef52ea480ff3ef4b1f448cbe2d32b55da34fa6271eccc15cf59ece9d4b9602356d122ecb96556445e2156c254e2ebf5f7d8ed91a5f94532074bbfee9c56d598f75da5524e5b5d9cd1abbd7fb2d0e2cf15fb751c42fb626279a543fe65092eba444793d399176ef2d8960916e04eee1a4364196a67d72c76dbc1a441792f9262ee73551ea3f805ac13e06ca76f9488038027f925bfde62a89535b627c7a565ab32476d29b94bf3381cd5d013ee9625f1bf4f4f4dbbdaedbad6d7a6f5dc3911bf54d13580aee5ea5db744e7bade4e5f4193b73e8f771dd681b36f692279674fa6fd8a6a0beb74b626563032ecbf8de8e7c9190033dae633ac0d64c9c2b20a46809530386eb87e3709afa9606adfcb5055ad688374770842569372ab224afa0229d1987d9d433cfd563811e2dab6fbdc48d998aa1ba3e8141d1c13e100cbe6dd6bd2a16dd8c08ff58a72ed1a056ce50e00357fca13023e0be2d0733c89f623c1bc5f1469aa1d9a01377e28a7a0b6ad94404216be4ed1c48bfedf8583575c3dcb934a1d23cf2e0e08da97fdcf11a31741fd20bf9155b0b87dc9b97b498e9e2afe145a09b2297e4669a71cbc014317ab4e3ec029b14214ddb73115b4d1dbd1aa1c7b3f4e88fd0be2a7d4a428c361139cb76e6070416bce953de75b22bc8be60c315bdae0e97b36f127c25a9c4cdb18d15e9554a972bf17d0241b43b786e61086492481d29613a9f1b393c3908101e32d4e3d16499e64b76bb0c216c4686215f2d169737ae9c396fb707dcb97568c1100f57a1f233583131d26fea83eec13721cfbe7a27e3e5abd1cb828674aa135051b9378d19f20e579bb56b6f62d325bb20cd11d0564144b024122bde7194f1f5d21799bf15976db86d9bfc0815b027c5a26c0eb1174f377b43808da102657e83a4823b37c37aed9c87330101657dc6b7878b0394ac611dfa11e554f7566fafc5f80fa140fdf160514d0a8d35c60ba665c3655927663fd5a6983d08fd72edbb22abfc45fef48a8e0c4385983a6587a3c90a60fa5d1c58ee553c44141c7b7da2c106e1fb173d416a949a999bd0800c404807e7c80dcb1c33bfb0b0830f123cb657c36880863c11051ee97ac9a7b6a965d4b04eca31e5bca4d4a91c96816fe8f46a075346520b1fa50e16d7d23ed34c9dfe360a7f304793f2107c9438d2eeb1baba16b04b4f0a2a20940e0b8b58d210d633f5b9c28a91a0de953a0c4f6605698022702627e7588e88b534497b630924b8a196f4b5b346ee6ca18842fe7e26435c978366f9a83cb80976fc85514fe013713cf07b40664da107f69cdfdb30d206d49407688f5b914d9240dbcf125c2a1f0f120214d49287979339f260816fc04117103f086a7a934a2df1ee572b0155a7627ffe6530e6d0317d6fedd02f171656a1d53e2a32055731b4fadc19e0acd114668471e8279bb35fd84efa350b6790953ebafdead4caa9e03d819a24c2de5d2ffad0f88b1b746ecce2c34966c40b33edbb9f9f2634d135fb788e28889149ad38a6552d1d11f560a2d3152093fd7c02a1fd2a132060c9c772857012be48734b5d13c21ea8f868796c64bfaf4848c560e32f0808d98a272477eb5551472ebbac8c8be04f87be5e96f5c7f76c3c2635d972e6c8b0ed95a8e79f1f9e73f82d826ce87b7d6641e0218b2264db427e0bc6faf364c2f5280959595cf8a3ab084e3d03f8c1f4611938e59cd6feb65307ae83f01b15e1299bd3e92af55000d4ee69971fe706b97d4eb982cacac570727cf82e66d42b0702399df361becd04a3efd19595dc0d296042bfdf66752cc5df3110371c80da5f941228248d13b12658886ad17237fa012056123a0a7e86d6bea22134cb1951a6cc3e8910fffdd82648e2a02a92d7b6c6ff9a84502a2451b5d23ca50dc64ff9ac3728344e36ca376daebb637d8842e90512dc2d2ce6fa31362195ce5aaf01b5d62a9f2f357a7e8a4d3978f0ff6fc5b7df56d20a6fe3c84b9571e7c89ea3a0f6933396d9c97d3c03decf3f7af98276701cd32f1ddd3bd9af9c32abcb1b3327a2912eb291", 0x1000}, {&(0x7f0000002380)="b673e7cdd6ded6d027597bb8b29af937f233b0fa6e54a6841a321b88019174258b3200cf6ab7a8a9bcabd5df4e1ad89696d943d36d8fda7b7f8a1f76f6f63bd441c1f6c4cbd841d7101c8242a0ea9469b46ae37e1fa49b69701591f09d512cf9b60795f28d3b562b92dc7368a5b0bc204ca387daf72a138a48390a8bd0a5843770752deaa477db2e984f0cfd2559417c6cc6f678f9b78034acf4f0329fdb81df1e2eceb2e976212dd46b955e", 0xac}, {&(0x7f0000002440)="0f1932a2ba23f412c6fce6efe7a6d70c247bcc5ae3742b8aaad2ae6146149e015c41d4b4fe8423ec2a6457058ba43f6a5c57731d033075d64af623b0448b3a6c50512371ccbb7d9a7fa0843c33f9e550c14ac25b7b1e167846e9c13a271a0b57af6b66bc2f9337c206d82f3305dfd711e48c437adeb51ae031646ab9d9e698863b1df86f2604432a8e726d996b8736b9f83509d17055da7855f9e6cc009782189faf8340018ac5cca69a06448c9c", 0xae}], 0x4, 0x81, 0x0, 0x1) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="4208351e0d8de862b079608d42af2bc502769d267fb5ec6969257a02913280ba6688c28a09bcefe91198c3344a0b54620db145111cf981b3ea2cb74bb99903c4fc3ba3ba14dbc5c03e44bf845319"]) [ 991.896731][T29233] EXT4-fs (loop1): bad geometry: block count 710 exceeds size of device (525 blocks) [ 992.136612][T29267] FAT-fs (loop4): Unrecognized mount option "B5by`B+v&ii%z2fŠ 4J TbE" or missing value 07:21:47 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000003c0)="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", 0x11e}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000000)={[], [{@smackfsfloor={'smackfsfloor', 0x3d, 'vfat\x00'}}, {@uid_gt={'uid>', 0xee00}}]}) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x7ff, 0x1, 0xe6, 0x7}, {0x0, 0x81, 0x25, 0xaa}, {0x1f, 0x1f, 0xa3, 0x8}, {0x1, 0x26, 0x5, 0x2}]}) preadv(r1, &(0x7f0000000340)=[{&(0x7f0000000140)=""/122, 0x7a}, {&(0x7f00000001c0)=""/61, 0x3d}, {&(0x7f0000000280)=""/182, 0xb6}], 0x3, 0x2, 0xc7) r2 = openat$incfs(r0, &(0x7f0000000380)='.pending_reads\x00', 0x2602, 0x40) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r3, 0xc0182101, &(0x7f0000000100)={r4}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000140)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r3, 0xc0182101, &(0x7f00000001c0)={r5}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000500)={r5, 0x3, 0x8}) r6 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r6, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r6, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r6, 0x4004af61, &(0x7f0000000540)=0x1) 07:21:47 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f0000000100000000000003a2000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:21:47 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:47 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="20000001c702000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:21:47 executing program 4: ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000000)={0x0, 0x4, 0x4d, 0x0, 0x12}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x8801, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.log\x00', 0x101000, 0x10) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000140)={0x0, {0x2, 0x4e23, @rand_addr=0x64010102}, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e21, @private=0xa010100}, 0xc4, 0x0, 0x0, 0x0, 0xbbeb, 0x0, 0x9, 0xfffffffffffffffc, 0x2}) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="b9dd2a9486efcb79648dd46ca9f804a4eefdd3003eff07b53af1ed1a40318ad8ffd0236e3f714803bd4bb2389f207347d3a80ea7a6e8c508272412f3f36edd2b5c9c1144988f07a07903b00ca94aa797e09791655dae83eae0dc9a393224993b8c8b10cc41d21ed560ba03c85c0bbc6a749a07426c035b4e524fcc556078eadb7e5a74085ef2cbb6b1a462d01b2d62d1ebbaa67ddf1ff7d097025bb9"]) 07:21:47 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:47 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:47 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:47 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) [ 992.631080][T29282] EXT4-fs (loop1): bad geometry: block count 711 exceeds size of device (525 blocks) [ 992.642071][T29283] FAT-fs (loop4): Unrecognized mount option "*ydl" or missing value [ 992.654321][T29285] EXT4-fs (loop5): error: could not find journal device path: error -2 07:21:47 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:47 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) [ 992.792871][T29282] EXT4-fs (loop1): bad geometry: block count 711 exceeds size of device (525 blocks) [ 992.819936][T29311] FAT-fs (loop4): Unrecognized mount option "*ydl" or missing value 07:21:47 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000003c0)="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", 0x11e}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000000)={[], [{@smackfsfloor={'smackfsfloor', 0x3d, 'vfat\x00'}}, {@uid_gt={'uid>', 0xee00}}]}) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x7ff, 0x1, 0xe6, 0x7}, {0x0, 0x81, 0x25, 0xaa}, {0x1f, 0x1f, 0xa3, 0x8}, {0x1, 0x26, 0x5, 0x2}]}) preadv(r1, &(0x7f0000000340)=[{&(0x7f0000000140)=""/122, 0x7a}, {&(0x7f00000001c0)=""/61, 0x3d}, {&(0x7f0000000280)=""/182, 0xb6}], 0x3, 0x2, 0xc7) r2 = openat$incfs(r0, &(0x7f0000000380)='.pending_reads\x00', 0x2602, 0x40) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r3, 0xc0182101, &(0x7f0000000100)={r4}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000140)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r3, 0xc0182101, &(0x7f00000001c0)={r5}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000500)={r5, 0x3, 0x8}) r6 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r6, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r6, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) 07:21:47 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f0000000100000000000003a3000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:21:47 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:47 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) write$tcp_mem(0xffffffffffffffff, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) ioctl$SIOCGETNODEID(0xffffffffffffffff, 0x89e1, 0xfffffffffffffffe) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) 07:21:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="20000000cb02000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:21:47 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x40010, r0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) preadv(r1, &(0x7f0000000280), 0x0, 0x9, 0x420) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)) 07:21:48 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:48 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) write$tcp_mem(0xffffffffffffffff, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) ioctl$SIOCGETNODEID(0xffffffffffffffff, 0x89e1, 0xfffffffffffffffe) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) 07:21:48 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab59362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) [ 993.487103][T29326] EXT4-fs (loop1): bad geometry: block count 715 exceeds size of device (525 blocks) [ 993.488033][T29332] EXT4-fs (loop5): error: could not find journal device path: error -2 [ 993.512450][T29330] FAT-fs (loop4): Directory bread(block 6) failed 07:21:48 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:48 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x9, 0x4, 0x0, 0x6, 0x798, 0x3, 0x0, 0x1, 0xfb, 0x40, 0x18d, 0x4ed, 0x56e9, 0x38, 0x1, 0x1, 0x1b8, 0x7}, [{0x60000000, 0x1, 0x5e4, 0x9980, 0x6, 0x4, 0x2, 0x3}, {0x6, 0x80000000, 0xdd, 0x9, 0x401, 0x8, 0x8, 0x7f}], "1eab9fc195d03004141d6cdbc55ee93e7a859383c421e317a74e594f32f65f972e095ddd5ec7744d51fe18c7fd304eb84c96ff9c1d5e55df991487272174a52aafba38a4dd96b2a191e697bec18e7336d907d2bb07b1d2dcb84ed310a5c6db42a6e5b967b1a782b61d62a15d0825bacfc25b7b78672626d9ac4917abd9ef591d1376c47355ff5e54dbf424648610fd1c944577175e276a5727b020f288d3e190275f44e4aaffa888954679d76ace165070191bb50e6b59b0930b3bbfdc42e3764c1015aded3859caed708065", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x67c) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)) fgetxattr(r1, &(0x7f0000000c40)=@known='system.advise\x00', &(0x7f0000000c80)=""/242, 0xf2) r2 = open_tree(r0, &(0x7f0000000d80)='./file0\x00', 0x100) fsetxattr$security_ima(r2, &(0x7f0000000dc0), &(0x7f0000000e00)=@ng={0x4, 0xe, "b248c3d9f21ce4db19629148"}, 0xe, 0x2) fstat(r0, &(0x7f0000000000)) ioctl$INCFS_IOC_CREATE_FILE(r0, 0xc058671e, &(0x7f0000000bc0)={{'\x00', 0x2}, {0x2}, 0x40, 0x0, 0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f0000000900)="93c7863fabe3dd2471ccf6a2e9879135c6fba0322d04766f0714c272f594e9cba97127abea56cf2c494e25e636fb4ad07f3c17967c0084a3ce02752883530d0b", 0x40, 0x0, &(0x7f0000000940)={0x2, 0x16e, {0x1, 0xc, 0xb0, "4f85afb94f46cf860cdaa24ab5110258f7f6cecc9a667a3c74980cf09f1e9f803e375f345432050373f7ed015520f01d2bb47109f027c22f316b5cb3af6c28239007ec920077e6cfd0c4bcc5742919177179b9ee512982184028291bca18be527564412d45776d279d7d5c0b55e53fd6d40a383744b0154949b0f017cf3474b1aef03fce0cb086e6e7d156b68ca8478028effd7dbacbeca789240f45f1f4df60923329804ce82e34c39f71d29791c629", 0xb1, "0f2cb8db08ea477151fd3e462604a33f2199377ecf398f6cfc7dc5995006b91c156a6241516a472c2a7260890d21de06ee22462bf88f3d2c7d4d3a34a0689e7c007dc7e2ec80ae501056d5960f22e20fdc578afd3dd7d92999c1795660abb563a31c9515a5b9c5876035ce7932e5709f44281bcc5cd9d3a3a26acefde614ce903578fc516254bbbf8ded9e727e45fcc5c8f930129b6759e02595578c03dac521ed8451c2065906a9cc8f807cdaecf329c7"}, 0xff, "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"}, 0x279}) 07:21:48 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f0000000100000000000003a4000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) [ 993.610494][T29326] EXT4-fs (loop1): bad geometry: block count 715 exceeds size of device (525 blocks) [ 993.753731][T29356] EXT4-fs (loop5): error: could not find journal device path: error -2 [ 993.875510][T29359] FAT-fs (loop4): Directory bread(block 6) failed 07:21:48 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000003c0)="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", 0x11e}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000000)={[], [{@smackfsfloor={'smackfsfloor', 0x3d, 'vfat\x00'}}, {@uid_gt={'uid>', 0xee00}}]}) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x7ff, 0x1, 0xe6, 0x7}, {0x0, 0x81, 0x25, 0xaa}, {0x1f, 0x1f, 0xa3, 0x8}, {0x1, 0x26, 0x5, 0x2}]}) preadv(r1, &(0x7f0000000340)=[{&(0x7f0000000140)=""/122, 0x7a}, {&(0x7f00000001c0)=""/61, 0x3d}, {&(0x7f0000000280)=""/182, 0xb6}], 0x3, 0x2, 0xc7) r2 = openat$incfs(r0, &(0x7f0000000380)='.pending_reads\x00', 0x2602, 0x40) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r3, 0xc0182101, &(0x7f0000000100)={r4}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000140)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r3, 0xc0182101, &(0x7f00000001c0)={r5}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000500)={r5, 0x3, 0x8}) r6 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r6, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) 07:21:48 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca00c2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab5d362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6c33ac7f7e58f57cb6c37e89f0e036126b592ecb1c4e841590662b9aaabd775c5"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:48 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) write$tcp_mem(0xffffffffffffffff, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) ioctl$SIOCGETNODEID(0xffffffffffffffff, 0x89e1, 0xfffffffffffffffe) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) 07:21:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="20000001d502000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:21:48 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f0000000100000000000003a5000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:21:48 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0xb) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020101000240008000f801e04fe51e362b35757d0801fb01de669c51aa519b1fdd2c700e5fbd528483f25f937d639851aad0891629b2db5115563d04c8264f88f4da3c5db15006bb96000000000000009dfd671f7472bd63eea132ecbd875786ee07aa34881b70f4cea8dba7a8e2153ff254ff920581f58d6c8e5e9a7cfe9b794a84e44eacba79c1d931f057c4edb95bfad1f03d133d847df2b604916f5270da0e9a", 0xae}, {0x0, 0x0, 0x600}], 0x2000000, &(0x7f0000000080)) 07:21:48 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) [ 994.319688][ T22] kauditd_printk_skb: 172 callbacks suppressed [ 994.319697][ T22] audit: type=1326 audit(1621927308.816:414): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29327 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7fc00000 07:21:48 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab59362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6c33ac7f7e58f57cb6c37e89f0e036126b592ecb1c4e841590662b9aaabd775c5"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="20000000e002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:21:48 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca00c2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab5d362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6c33ac7f7e58f57cb6c37e89f0e036126b592ecb1c4e841590662b9aaabd775c5"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:48 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab59362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6c33ac7f7e58f57cb6c37e89f0e036126b592ecb1c4e841590662b9aaabd775c5"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) [ 994.399946][T29377] EXT4-fs (loop1): bad geometry: block count 725 exceeds size of device (525 blocks) [ 994.411315][T29378] FAT-fs (loop4): count of clusters too big (14680318) [ 994.423848][T29382] EXT4-fs (loop5): error: could not find journal device path: error -2 [ 994.440122][T29378] FAT-fs (loop4): Can't find a valid FAT filesystem 07:21:49 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) [ 994.547951][T29396] EXT4-fs (loop1): bad geometry: block count 736 exceeds size of device (525 blocks) [ 994.568936][T29398] FAT-fs (loop4): count of clusters too big (14680318) [ 994.589249][T29398] FAT-fs (loop4): Can't find a valid FAT filesystem [ 994.609609][T29396] EXT4-fs (loop1): bad geometry: block count 736 exceeds size of device (525 blocks) [ 995.223954][ T22] audit: type=1326 audit(1621927309.716:415): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29379 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7fc00000 [ 995.249146][ T22] audit: type=1326 audit(1621927309.716:416): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29379 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=16 compat=0 ip=0x4665d9 code=0x7fc00000 [ 995.274488][ T22] audit: type=1326 audit(1621927309.716:417): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29379 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7fc00000 [ 995.299873][ T22] audit: type=1326 audit(1621927309.716:418): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29379 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7fc00000 [ 995.325332][ T22] audit: type=1326 audit(1621927309.716:419): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29379 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7fc00000 [ 995.351463][ T22] audit: type=1326 audit(1621927309.716:420): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29379 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7fc00000 [ 995.377237][ T22] audit: type=1326 audit(1621927309.716:421): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29379 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7fc00000 07:21:49 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000003c0)="eb3c908000db013f04f93189ac3bae4612797b8bfdb878cecd3783b29fe17fdafdd3badc9a117904abbc4af117fd8c1a3e7ce3965076dccd3ef1a0ba838bd2d60e20ce940938377e9444ba54bc8c0e00d8a46f55e575d22ed65070834f88104b0d4e43c8e93c6c393762655c8ca7a865cef5aba2bc74a8f61517e4af5ad65d798d1556e52f6c85c7441ecfd9c3627b7367da5fb5ef8b122a64e11d1b26aed963dc12a40bf052a1cbdc06c577b6933a64ab671004242fdc078b82bcfae766a4a06215f3ba903bf6ccc14afc609b05316d3c60a8da9e192a8fd84cdd73072b08285143312b681a0105901c406adc3fc51aba8f1c1d140be25a691e5de77920b2f65484b7e725b31e9c6afa218b87f8d3c4dfa440594613ae10829c856c6e52", 0x11e}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000000)={[], [{@smackfsfloor={'smackfsfloor', 0x3d, 'vfat\x00'}}, {@uid_gt={'uid>', 0xee00}}]}) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x7ff, 0x1, 0xe6, 0x7}, {0x0, 0x81, 0x25, 0xaa}, {0x1f, 0x1f, 0xa3, 0x8}, {0x1, 0x26, 0x5, 0x2}]}) preadv(r1, &(0x7f0000000340)=[{&(0x7f0000000140)=""/122, 0x7a}, {&(0x7f00000001c0)=""/61, 0x3d}, {&(0x7f0000000280)=""/182, 0xb6}], 0x3, 0x2, 0xc7) r2 = openat$incfs(r0, &(0x7f0000000380)='.pending_reads\x00', 0x2602, 0x40) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r3, 0xc0182101, &(0x7f0000000100)={r4}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000140)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r3, 0xc0182101, &(0x7f00000001c0)={r5}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000500)={r5, 0x3, 0x8}) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') 07:21:49 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f0000000100000000000026a7000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:21:49 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab59362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6c33ac7f7e58f57cb6c37e89f0e036126"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:49 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:49 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x20010, r0, 0xedf0b000) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)) 07:21:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="20000002f802000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 995.402527][ T22] audit: type=1326 audit(1621927309.716:422): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29379 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7fc00000 [ 995.430802][ T22] audit: type=1326 audit(1621927309.716:423): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29379 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7fc00000 07:21:50 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab59362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6c33ac7f7e58f57cb6c37e89f0e036126"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:50 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)) socket$inet_udp(0x2, 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r0, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) ioctl$SIOCGETNODEID(r0, 0x89e1, 0xfffffffffffffffe) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) 07:21:50 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f0000000100000000000026ae000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:21:50 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="342c5371e3b6547292507f625121d9e95da51ca5d46d7dad8b8314a1bb3afafcafcc375d9ecfaffb2cde1388f05d443be9875ca309ddcf868afdaec9b1df36319fa7a587efc69264d3710573da8e1852c5a11c3a"]) [ 995.528589][T29415] EXT4-fs (loop5): error: could not find journal device path: error -2 [ 995.546666][T29417] FAT-fs (loop4): Directory bread(block 6) failed [ 995.560122][T29419] EXT4-fs (loop1): bad geometry: block count 760 exceeds size of device (525 blocks) 07:21:50 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)) socket$inet_udp(0x2, 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r0, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) ioctl$SIOCGETNODEID(r0, 0x89e1, 0xfffffffffffffffe) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) 07:21:50 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab59362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6c33ac7f7e58f57cb6c37e89f0e036126"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) [ 995.724132][T29419] EXT4-fs (loop1): bad geometry: block count 760 exceeds size of device (525 blocks) [ 995.735921][T29436] EXT4-fs (loop5): error: could not find journal device path: error -2 [ 995.821173][T29444] FAT-fs (loop4): Unrecognized mount option "4" or missing value 07:21:50 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000003c0)="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", 0x11e}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000000)={[], [{@smackfsfloor={'smackfsfloor', 0x3d, 'vfat\x00'}}, {@uid_gt={'uid>', 0xee00}}]}) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x7ff, 0x1, 0xe6, 0x7}, {0x0, 0x81, 0x25, 0xaa}, {0x1f, 0x1f, 0xa3, 0x8}, {0x1, 0x26, 0x5, 0x2}]}) preadv(r1, &(0x7f0000000340)=[{&(0x7f0000000140)=""/122, 0x7a}, {&(0x7f00000001c0)=""/61, 0x3d}, {&(0x7f0000000280)=""/182, 0xb6}], 0x3, 0x2, 0xc7) r2 = openat$incfs(r0, &(0x7f0000000380)='.pending_reads\x00', 0x2602, 0x40) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r3, 0xc0182101, &(0x7f0000000100)={r4}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000140)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r3, 0xc0182101, &(0x7f00000001c0)={r5}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000500)={r5, 0x3, 0x8}) 07:21:50 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab59362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6c33ac7f7e58f57cb6c37e89f0e036126b592ecb1c4e84159"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca00c2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab5d362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6c33ac7f7e58f57cb6c37e89f0e036126b592ecb1c4e841590662b9aaabd775c5"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="20000001fa02000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:21:50 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)) socket$inet_udp(0x2, 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r0, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) ioctl$SIOCGETNODEID(r0, 0x89e1, 0xfffffffffffffffe) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) 07:21:50 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f00000001000000007ffffff2000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:21:50 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="01"]) 07:21:50 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca00c2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab5d362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6c33ac7f7e58f57cb6c37e89f0e036126b592ecb1c4e841590662b9aaabd775c5"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:50 executing program 0: ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r0, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) ioctl$SIOCGETNODEID(r0, 0x89e1, 0xfffffffffffffffe) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) [ 996.395372][T29455] EXT4-fs (loop1): bad geometry: block count 762 exceeds size of device (525 blocks) 07:21:51 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab59362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6c33ac7f7e58f57cb6c37e89f0e036126b592ecb1c4e84159"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:51 executing program 0: ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r0, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) ioctl$SIOCGETNODEID(r0, 0x89e1, 0xfffffffffffffffe) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) [ 996.468512][T29460] FAT-fs (loop4): Unrecognized mount option "" or missing value [ 996.480998][T29464] EXT4-fs (loop5): error: could not find journal device path: error -2 [ 996.496600][T29455] EXT4-fs (loop1): bad geometry: block count 762 exceeds size of device (525 blocks) 07:21:51 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:51 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x30, r0, 0xc357d000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)) r1 = dup(r0) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000040)=0x8) [ 996.666594][T29490] FAT-fs (loop4): Directory bread(block 6) failed 07:21:51 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000003c0)="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", 0x11e}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000000)={[], [{@smackfsfloor={'smackfsfloor', 0x3d, 'vfat\x00'}}, {@uid_gt={'uid>', 0xee00}}]}) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x7ff, 0x1, 0xe6, 0x7}, {0x0, 0x81, 0x25, 0xaa}, {0x1f, 0x1f, 0xa3, 0x8}, {0x1, 0x26, 0x5, 0x2}]}) preadv(r1, &(0x7f0000000340)=[{&(0x7f0000000140)=""/122, 0x7a}, {&(0x7f00000001c0)=""/61, 0x3d}, {&(0x7f0000000280)=""/182, 0xb6}], 0x3, 0x2, 0xc7) openat$incfs(r0, &(0x7f0000000380)='.pending_reads\x00', 0x2602, 0x40) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000100)={r3}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000140)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f00000001c0)={r4}) 07:21:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="20000000fc02000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:21:51 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f00000001000000007ffffff8000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:21:51 executing program 0: ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r0, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) ioctl$SIOCGETNODEID(r0, 0x89e1, 0xfffffffffffffffe) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) 07:21:51 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab59362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6c33ac7f7e58f57cb6c37e89f0e036126b592ecb1c4e841590662b9aa"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:51 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:51 executing program 0: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:51 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f00000001000000007ffffff9000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) [ 997.312156][T29504] EXT4-fs (loop1): bad geometry: block count 764 exceeds size of device (525 blocks) [ 997.325754][T29502] EXT4-fs (loop5): error: could not find journal device path: error -2 07:21:51 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:51 executing program 0: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:51 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) [ 997.439686][T29504] EXT4-fs (loop1): bad geometry: block count 764 exceeds size of device (525 blocks) 07:21:52 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) [ 997.546825][T29525] EXT4-fs (loop5): error: could not find journal device path: error -2 07:21:52 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000003c0)="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", 0x11e}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000000)={[], [{@smackfsfloor={'smackfsfloor', 0x3d, 'vfat\x00'}}, {@uid_gt={'uid>', 0xee00}}]}) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x7ff, 0x1, 0xe6, 0x7}, {0x0, 0x81, 0x25, 0xaa}, {0x1f, 0x1f, 0xa3, 0x8}, {0x1, 0x26, 0x5, 0x2}]}) preadv(r1, &(0x7f0000000340)=[{&(0x7f0000000140)=""/122, 0x7a}, {&(0x7f00000001c0)=""/61, 0x3d}, {&(0x7f0000000280)=""/182, 0xb6}], 0x3, 0x2, 0xc7) openat$incfs(r0, &(0x7f0000000380)='.pending_reads\x00', 0x2602, 0x40) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000100)={r3}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000140)) 07:21:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000fff02000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:21:52 executing program 0: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:52 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f00000001000000007ffffffe000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:21:52 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:52 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r0, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) ioctl$SIOCGETNODEID(r0, 0x89e1, 0xfffffffffffffffe) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) 07:21:52 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab59362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6c33ac7f7e58f57cb6c37e89f0e036126b592ecb1c4e841590662b9aaabd775"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca00c2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab5d362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6c33ac7f7e58f57cb6c37e89f0e036126b592ecb1c4e841590662b9aaabd775c5"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) [ 998.217258][T29543] EXT4-fs (loop1): bad geometry: block count 767 exceeds size of device (525 blocks) 07:21:52 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab59362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6c33ac7f7e58f57cb6c37e89f0e036126b592ecb1c4e841590662b9aaabd775"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:52 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r0, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) ioctl$SIOCGETNODEID(r0, 0x89e1, 0xfffffffffffffffe) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) [ 998.286192][T29544] EXT4-fs (loop5): error: could not find journal device path: error -2 [ 998.304602][T29543] EXT4-fs (loop1): bad geometry: block count 767 exceeds size of device (525 blocks) 07:21:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000004000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:21:52 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab59362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6c33ac7f7e58f57cb6c37e89f0e036126b592ecb1c4e841590662b9aaabd775c5"], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:52 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f00000001000000007fffffff000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) [ 998.460351][T29573] EXT4-fs (loop5): error: could not find journal device path: error -2 [ 998.478335][T29572] EXT4-fs (loop1): bad geometry: block count 1024 exceeds size of device (525 blocks) [ 998.552925][T29572] EXT4-fs (loop1): bad geometry: block count 1024 exceeds size of device (525 blocks) 07:21:53 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000003c0)="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", 0x11e}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000000)={[], [{@smackfsfloor={'smackfsfloor', 0x3d, 'vfat\x00'}}, {@uid_gt={'uid>', 0xee00}}]}) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x7ff, 0x1, 0xe6, 0x7}, {0x0, 0x81, 0x25, 0xaa}, {0x1f, 0x1f, 0xa3, 0x8}, {0x1, 0x26, 0x5, 0x2}]}) preadv(r1, &(0x7f0000000340)=[{&(0x7f0000000140)=""/122, 0x7a}, {&(0x7f00000001c0)=""/61, 0x3d}, {&(0x7f0000000280)=""/182, 0xb6}], 0x3, 0x2, 0xc7) openat$incfs(r0, &(0x7f0000000380)='.pending_reads\x00', 0x2602, 0x40) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000100)={r3}) 07:21:53 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r0, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) ioctl$SIOCGETNODEID(r0, 0x89e1, 0xfffffffffffffffe) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) 07:21:53 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca00c2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab5d362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6c33ac7f7e58f57cb6c37e89f0e036126b592ecb1c4e841590662b9aaabd775c5"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:53 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000020001000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:21:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000010000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:21:53 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:53 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r0, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) ioctl$SIOCGETNODEID(r0, 0x89e1, 0xfffffffffffffffe) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) 07:21:53 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab59362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6c33ac7f7e58f57cb6c37e89f0e036126b592ecb1c4e841590662b9aaabd775c5"], &(0x7f0000000080)='GPL\x00', 0x0, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) [ 999.045354][T29583] EXT4-fs (loop5): error: could not find journal device path: error -2 [ 999.066540][T29587] EXT4-fs (loop1): bad geometry: block count 4096 exceeds size of device (525 blocks) 07:21:53 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x0, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca00c2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab5d362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6c33ac7f7e58f57cb6c37e89f0e036126b592ecb1c4e841590662b9aaabd775c5"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:53 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r0, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) ioctl$SIOCGETNODEID(r0, 0x89e1, 0xfffffffffffffffe) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) 07:21:53 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r0, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) ioctl$SIOCGETNODEID(r0, 0x89e1, 0xfffffffffffffffe) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) 07:21:53 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000030001000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) [ 999.189205][T29587] EXT4-fs (loop1): bad geometry: block count 4096 exceeds size of device (525 blocks) [ 999.303506][T29614] EXT4-fs (loop5): error: could not find journal device path: error -2 07:21:54 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000003c0)="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", 0x11e}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000000)={[], [{@smackfsfloor={'smackfsfloor', 0x3d, 'vfat\x00'}}, {@uid_gt={'uid>', 0xee00}}]}) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x7ff, 0x1, 0xe6, 0x7}, {0x0, 0x81, 0x25, 0xaa}, {0x1f, 0x1f, 0xa3, 0x8}, {0x1, 0x26, 0x5, 0x2}]}) preadv(r1, &(0x7f0000000340)=[{&(0x7f0000000140)=""/122, 0x7a}, {&(0x7f00000001c0)=""/61, 0x3d}, {&(0x7f0000000280)=""/182, 0xb6}], 0x3, 0x2, 0xc7) openat$incfs(r0, &(0x7f0000000380)='.pending_reads\x00', 0x2602, 0x40) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000100)={r3}) 07:21:54 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x0, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000000010019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:21:54 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:54 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000040001000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) [ 999.876003][ T22] kauditd_printk_skb: 62 callbacks suppressed [ 999.876011][ T22] audit: type=1326 audit(1621927314.367:486): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29585 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7fc00000 07:21:54 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:54 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:54 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000050001000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) [ 999.955788][T29629] EXT4-fs (loop5): error: could not find journal device path: error -2 [ 999.966680][T29631] EXT4-fs (loop1): bad geometry: block count 65536 exceeds size of device (525 blocks) 07:21:54 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab59362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6c33ac7f7e58f57cb6c37e89f0e036126b592ecb1c4e841590662b9aaabd775c5"], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca00c2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab5d362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6c33ac7f7e58f57cb6c37e89f0e036126b592ecb1c4e841590662b9aaabd775c5"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:54 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:54 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab59362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6c33ac7f7e58f57cb6c37e89f0e036126b592ecb1c4e841590662b9aaabd775c5"], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) [ 1000.102716][T29648] EXT4-fs (loop5): error: could not find journal device path: error -2 [ 1000.114089][T29631] EXT4-fs (loop1): bad geometry: block count 65536 exceeds size of device (525 blocks) 07:21:54 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000060001000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) [ 1000.246529][T29663] EXT4-fs (loop5): error: could not find journal device path: error -2 07:21:55 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000003c0)="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", 0x11e}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000000)={[], [{@smackfsfloor={'smackfsfloor', 0x3d, 'vfat\x00'}}, {@uid_gt={'uid>', 0xee00}}]}) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x7ff, 0x1, 0xe6, 0x7}, {0x0, 0x81, 0x25, 0xaa}, {0x1f, 0x1f, 0xa3, 0x8}, {0x1, 0x26, 0x5, 0x2}]}) preadv(r1, &(0x7f0000000340)=[{&(0x7f0000000140)=""/122, 0x7a}, {&(0x7f00000001c0)=""/61, 0x3d}, {&(0x7f0000000280)=""/182, 0xb6}], 0x3, 0x2, 0xc7) openat$incfs(r0, &(0x7f0000000380)='.pending_reads\x00', 0x2602, 0x40) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000100)) 07:21:55 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab59362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6c33ac7f7e58f57cb6c37e89f0e036126b592ecb1c4e841590662b9aaabd775c5"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) 07:21:55 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, 0x0) write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="20000000000e010019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 1000.772750][ T22] audit: type=1326 audit(1621927315.267:487): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29630 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7fc00000 07:21:55 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000070001000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:21:55 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) 07:21:55 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, 0x0) write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab59362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6c33ac7f7e58f57cb6c37e89f0e036126b592ecb1c4e841590662b9aaabd775c5"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) [ 1000.867557][ T22] audit: type=1326 audit(1621927315.267:488): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29630 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=16 compat=0 ip=0x4665d9 code=0x7fc00000 07:21:55 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000080001000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:21:55 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, 0x0) write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) [ 1000.916403][T29677] EXT4-fs (loop1): bad geometry: block count 69120 exceeds size of device (525 blocks) [ 1000.929282][T29679] EXT4-fs (loop5): error: could not find journal device path: error -2 07:21:55 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) 07:21:55 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:55 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) [ 1001.059541][T29677] EXT4-fs (loop1): bad geometry: block count 69120 exceeds size of device (525 blocks) [ 1001.132917][T29698] EXT4-fs (loop5): error: could not find journal device path: error -2 07:21:56 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000003c0)="eb3c908000db013f04f93189ac3bae4612797b8bfdb878cecd3783b29fe17fdafdd3badc9a117904abbc4af117fd8c1a3e7ce3965076dccd3ef1a0ba838bd2d60e20ce940938377e9444ba54bc8c0e00d8a46f55e575d22ed65070834f88104b0d4e43c8e93c6c393762655c8ca7a865cef5aba2bc74a8f61517e4af5ad65d798d1556e52f6c85c7441ecfd9c3627b7367da5fb5ef8b122a64e11d1b26aed963dc12a40bf052a1cbdc06c577b6933a64ab671004242fdc078b82bcfae766a4a06215f3ba903bf6ccc14afc609b05316d3c60a8da9e192a8fd84cdd73072b08285143312b681a0105901c406adc3fc51aba8f1c1d140be25a691e5de77920b2f65484b7e725b31e9c6afa218b87f8d3c4dfa440594613ae10829c856c6e52", 0x11e}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000000)={[], [{@smackfsfloor={'smackfsfloor', 0x3d, 'vfat\x00'}}, {@uid_gt={'uid>', 0xee00}}]}) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x7ff, 0x1, 0xe6, 0x7}, {0x0, 0x81, 0x25, 0xaa}, {0x1f, 0x1f, 0xa3, 0x8}, {0x1, 0x26, 0x5, 0x2}]}) preadv(r1, &(0x7f0000000340)=[{&(0x7f0000000140)=""/122, 0x7a}, {&(0x7f00000001c0)=""/61, 0x3d}, {&(0x7f0000000280)=""/182, 0xb6}], 0x3, 0x2, 0xc7) openat$incfs(r0, &(0x7f0000000380)='.pending_reads\x00', 0x2602, 0x40) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000100)) 07:21:56 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(0xffffffffffffffff, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020d0019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:21:56 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:56 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000090001000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) [ 1001.671465][ T22] audit: type=1326 audit(1621927316.157:489): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29667 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7fc00000 07:21:56 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) 07:21:56 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(0xffffffffffffffff, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) [ 1001.730637][T29712] EXT4-fs (loop5): error: could not find journal device path: error -2 [ 1001.751914][T29719] EXT4-fs (loop1): bad geometry: block count 852480 exceeds size of device (525 blocks) 07:21:56 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) [ 1001.775275][ T22] audit: type=1326 audit(1621927316.157:490): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29667 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=16 compat=0 ip=0x4665d9 code=0x7fc00000 07:21:56 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(0xffffffffffffffff, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:56 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) 07:21:56 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f0000000100000000000a0001000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) [ 1001.900505][T29719] EXT4-fs (loop1): bad geometry: block count 852480 exceeds size of device (525 blocks) 07:21:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000a00000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 1002.016517][T29741] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 not in group (block 5)! [ 1002.029181][T29740] EXT4-fs (loop5): error: could not find journal device path: error -2 [ 1002.053952][T29741] EXT4-fs (loop1): group descriptors corrupted! [ 1002.170552][T29741] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 not in group (block 5)! [ 1002.190827][T29741] EXT4-fs (loop1): group descriptors corrupted! 07:21:57 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000003c0)="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", 0x11e}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000000)={[], [{@smackfsfloor={'smackfsfloor', 0x3d, 'vfat\x00'}}, {@uid_gt={'uid>', 0xee00}}]}) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x7ff, 0x1, 0xe6, 0x7}, {0x0, 0x81, 0x25, 0xaa}, {0x1f, 0x1f, 0xa3, 0x8}, {0x1, 0x26, 0x5, 0x2}]}) preadv(r1, &(0x7f0000000340)=[{&(0x7f0000000140)=""/122, 0x7a}, {&(0x7f00000001c0)=""/61, 0x3d}, {&(0x7f0000000280)=""/182, 0xb6}], 0x3, 0x2, 0xc7) openat$incfs(r0, &(0x7f0000000380)='.pending_reads\x00', 0x2602, 0x40) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000100)) 07:21:57 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, 0x0, 0x0) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:57 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab59362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6c33ac7f7e58f57cb6c37e89f0e036126b592ecb1c4e841590662b9aaabd775c5"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:57 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f0000000100000000000b0001000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:21:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000202000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 1002.572797][ T22] audit: type=1326 audit(1621927317.067:491): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29716 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7fc00000 07:21:57 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) [ 1002.633394][T29759] EXT4-fs (loop5): error: could not find journal device path: error -2 [ 1002.660656][T29762] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 07:21:57 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, 0x0, 0x0) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:57 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f0000000100000000000c0001000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) [ 1002.684425][T29762] EXT4-fs (loop1): orphan cleanup on readonly fs [ 1002.693351][T29762] EXT4-fs error (device loop1): ext4_orphan_get:1264: comm syz-executor.1: bad orphan inode 33554432 [ 1002.707886][T29762] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 07:21:57 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:57 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, 0x0, 0x0) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000302000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:21:57 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) [ 1002.870799][T29778] EXT4-fs (loop5): error: could not find journal device path: error -2 [ 1002.887840][T29791] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 1002.908125][T29791] EXT4-fs (loop1): orphan cleanup on readonly fs [ 1002.920168][T29791] EXT4-fs error (device loop1): ext4_orphan_get:1264: comm syz-executor.1: bad orphan inode 33554432 [ 1002.944395][T29791] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 07:21:58 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000003c0)="eb3c908000db013f04f93189ac3bae4612797b8bfdb878cecd3783b29fe17fdafdd3badc9a117904abbc4af117fd8c1a3e7ce3965076dccd3ef1a0ba838bd2d60e20ce940938377e9444ba54bc8c0e00d8a46f55e575d22ed65070834f88104b0d4e43c8e93c6c393762655c8ca7a865cef5aba2bc74a8f61517e4af5ad65d798d1556e52f6c85c7441ecfd9c3627b7367da5fb5ef8b122a64e11d1b26aed963dc12a40bf052a1cbdc06c577b6933a64ab671004242fdc078b82bcfae766a4a06215f3ba903bf6ccc14afc609b05316d3c60a8da9e192a8fd84cdd73072b08285143312b681a0105901c406adc3fc51aba8f1c1d140be25a691e5de77920b2f65484b7e725b31e9c6afa218b87f8d3c4dfa440594613ae10829c856c6e52", 0x11e}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000000)={[], [{@smackfsfloor={'smackfsfloor', 0x3d, 'vfat\x00'}}, {@uid_gt={'uid>', 0xee00}}]}) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x7ff, 0x1, 0xe6, 0x7}, {0x0, 0x81, 0x25, 0xaa}, {0x1f, 0x1f, 0xa3, 0x8}, {0x1, 0x26, 0x5, 0x2}]}) preadv(r1, &(0x7f0000000340)=[{&(0x7f0000000140)=""/122, 0x7a}, {&(0x7f00000001c0)=""/61, 0x3d}, {&(0x7f0000000280)=""/182, 0xb6}], 0x3, 0x2, 0xc7) openat$incfs(r0, &(0x7f0000000380)='.pending_reads\x00', 0x2602, 0x40) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, &(0x7f0000000100)={r2}) 07:21:58 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x0, 0xa}, 0x48) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:58 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab59362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6c33ac7f7e58f57cb6c37e89f0e036126b592ecb1c4e841590662b9aaabd775c5"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:58 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f0000000100000000000d0001000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:21:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000402000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:21:58 executing program 4: ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000042dc0)={0x7, [], 0x3, "effdfbfac8aecb"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000048f40)={0x9, [], 0x0, "3d62a25c2cd166"}) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000008c0)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000042dc0)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x3, "effdfbfac8aecb"}) r4 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x11) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000280)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000042dc0)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}], 0x3, "effdfbfac8aecb"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000048f40)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}], 0x0, "3d62a25c2cd166"}) r9 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x11) r10 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r9, 0x81f8943c, &(0x7f0000000280)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r10, 0xd000943d, &(0x7f0000042dc0)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}, {0x0, r13}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}], 0x3, "effdfbfac8aecb"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000048f40)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}], 0x0, "3d62a25c2cd166"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005dcc0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1, r8}, {0x0, r13}], 0x8, "0c78e3fa7daea1"}) r14 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r14, 0x0) preadv(r14, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="80"]) [ 1003.472418][ T22] audit: type=1326 audit(1621927317.967:492): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29760 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7fc00000 [ 1003.510860][ T22] audit: type=1326 audit(1621927317.967:493): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29760 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=16 compat=0 ip=0x4665d9 code=0x7fc00000 [ 1003.546773][T29803] EXT4-fs (loop5): error: could not find journal device path: error -2 07:21:58 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000003c0)="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", 0x11e}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000000)={[], [{@smackfsfloor={'smackfsfloor', 0x3d, 'vfat\x00'}}, {@uid_gt={'uid>', 0xee00}}]}) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x7ff, 0x1, 0xe6, 0x7}, {0x0, 0x81, 0x25, 0xaa}, {0x1f, 0x1f, 0xa3, 0x8}, {0x1, 0x26, 0x5, 0x2}]}) preadv(r1, &(0x7f0000000340)=[{&(0x7f0000000140)=""/122, 0x7a}, {&(0x7f00000001c0)=""/61, 0x3d}, {&(0x7f0000000280)=""/182, 0xb6}], 0x3, 0x2, 0xc7) openat$incfs(r0, &(0x7f0000000380)='.pending_reads\x00', 0x2602, 0x40) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, &(0x7f0000000100)={r2}) 07:21:58 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x0, 0xa}, 0x48) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:58 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab59362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6c33ac7f7e58f57cb6c37e89f0e036126b592ecb1c4e841590662b9aaabd775c5"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:58 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) creat(&(0x7f0000000000)='./file0/file0\x00', 0x2) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) vmsplice(r0, &(0x7f00000005c0)=[{&(0x7f0000000280)="84dbf3d0f5ee2e099e216635bfb282a040cd75acbeafe85f2228517751eb7482f0bec076bce45fe150a241362c8e1d52b131bbb04e1f555a4d5f01b894529cfdd0644cb29b5d3aa4ca432e5a082c06b8c48c3089daa833ff685cb5c3c7e44c7f1b05134e93cfa689aecf9ab5e299d57edf8a3658606b3ea0142da6a9d7eb7c28899a447e19350987040c4a8eedb1fd30fd6fc7b7afc24dfbb95fa22a78cf464ed7514e72b0cf855084d768cb0d499e5c08000f32d7f21e9a58cce041296e432f52c169c4ac", 0xc5}, {&(0x7f0000000380)="ff2ad9ccdea506e359f66b6186cd0ed0a19a660a3c79e5ed3f9840ab322613746eed308666f7a2510d5abf7c1645bf4f7033a07f6cb602dfaa9e54b70b838b1e8e638b86dedd389ab7afac1034fd5777f068bb646bd52a24d39ee060361c513bf73cdd51a4bac58ee19a535d7a7e4eea5f22095ab598fda9347e7a6b0d3e3502abed92db963758f047cc501944", 0x8d}, {&(0x7f0000000140)="61605a2db90904d8e21f39076ac82e737b322473590c8be814f3985794824c20ffdaf04c05c3e2436529211045f3ff19ecc63f1038e049e027be2198380cfd347b6134a20ca7bdc8599ff7c6280c364f5ddd7c02027d3e66ca57ac3f3e0f1083b0a95d69afaf78069f2e5b0ce09d07b404ae", 0x72}, {&(0x7f0000000440)="9b7110e542a28fae478af2d8bad0a6a104592401a582aced84b05c2fce26ed9265b8e5dc5f0aaa3214a33cff7ac12d0ec65002b317b6cfb50a2e20c7a1ddd2671c2e5e572f81f1d0175871555790564ceb551b95355e4dc2720f78e96d20f298b339c6ab2010ee7a5d6c4a4e1d7d305f867528df7c46de035fdb918ac4af3ef9a42fe4af790878159f0491690e8da3b156fcddcc3a9c460872a10294c7961adf3caa45a657cbf7b75328509ccdaa765ecd8e7ca7d469553bf3649dc240111cdb2315937420d970309b4d4d78ee7fd362d4dd19457471bdf673", 0xd9}, {&(0x7f0000000540)="a9bb3ccf126081548929d16e5b0c9fac13a044e74efd5a6cdda6400fe599be524a5e3f03852e5890d686bc781e3d1be2aa570dbf55c3faab2ac0bbc4b8cf8efe2248be589f355693c85c326f3a806abbd1f89ebdd8b390372ad1bb79b86427146845ce76ac225803c24a8dc1d4a586eda7e20741ab4c80", 0x77}], 0x5, 0x13) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)) [ 1003.572260][T29810] FAT-fs (loop4): Unrecognized mount option "" or missing value 07:21:58 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000003c0)="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", 0x11e}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000000)={[], [{@smackfsfloor={'smackfsfloor', 0x3d, 'vfat\x00'}}, {@uid_gt={'uid>', 0xee00}}]}) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x7ff, 0x1, 0xe6, 0x7}, {0x0, 0x81, 0x25, 0xaa}, {0x1f, 0x1f, 0xa3, 0x8}, {0x1, 0x26, 0x5, 0x2}]}) preadv(r1, &(0x7f0000000340)=[{&(0x7f0000000140)=""/122, 0x7a}, {&(0x7f00000001c0)=""/61, 0x3d}, {&(0x7f0000000280)=""/182, 0xb6}], 0x3, 0x2, 0xc7) openat$incfs(r0, &(0x7f0000000380)='.pending_reads\x00', 0x2602, 0x40) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, &(0x7f0000000100)={r2}) 07:21:58 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x0, 0xa}, 0x48) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:58 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f0000000100000000000e0001000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:21:58 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:58 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000003c0)="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", 0x11e}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000000)={[], [{@smackfsfloor={'smackfsfloor', 0x3d, 'vfat\x00'}}, {@uid_gt={'uid>', 0xee00}}]}) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x7ff, 0x1, 0xe6, 0x7}, {0x0, 0x81, 0x25, 0xaa}, {0x1f, 0x1f, 0xa3, 0x8}, {0x1, 0x26, 0x5, 0x2}]}) preadv(r1, &(0x7f0000000340)=[{&(0x7f0000000140)=""/122, 0x7a}, {&(0x7f00000001c0)=""/61, 0x3d}, {&(0x7f0000000280)=""/182, 0xb6}], 0x3, 0x2, 0xc7) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000100)={r3}) [ 1003.688544][T29814] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 1003.724006][T29814] EXT4-fs (loop1): orphan cleanup on readonly fs 07:21:58 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab59362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6c33ac7f7e58f57cb6c37e89f0e036126b592ecb1c4e841590662b9aaabd775c5"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) [ 1003.749527][T29814] EXT4-fs error (device loop1): ext4_orphan_get:1264: comm syz-executor.1: bad orphan inode 33554432 [ 1003.775197][T29838] EXT4-fs (loop5): error: could not find journal device path: error -2 [ 1003.783851][T29837] FAT-fs (loop4): Directory bread(block 6) failed [ 1003.799635][T29814] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 07:21:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000502000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:21:58 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:58 executing program 4: splice(0xffffffffffffffff, &(0x7f0000000000)=0x67c, 0xffffffffffffffff, &(0x7f0000000040)=0x3ff, 0x9, 0x8) mmap(&(0x7f00000ca000/0x1000)=nil, 0x1000, 0x2000000, 0x4010, 0xffffffffffffffff, 0xe10fa000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000140), 0x0, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)) 07:21:58 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:58 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000100001000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:21:58 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab59362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6c33ac7f7e58f57cb6c37e89f0e036126b592ecb1c4e841590662b9aaabd775c5"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:58 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab59362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6c33ac7f7e58f57cb6c37e89f0e036126b592ecb1c4e841590662b9aaabd775c5"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:58 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB="8fed0836ebb9cdc3f9c8c2ec4af033c4556615678ef58b8f843fa58ade4738d4fa1bfb3e7de7e36a10cb893b15d171d1f57eefb2c2875ecf2a2ac889a935227bbca2b2bb31c3c250a275c81b7c136cd5c5745477cf5395ac8469cb2c727f393e0ac224647dd96995fe57b8cad155f9acb1aa77048b9b386ead6852e375eda2fdac392359db0905f6012c541313ea854be157d60586eaebc60d4453d8"]) ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, &(0x7f0000000000)={0x1, 0xffffffffffffffff}) preadv(r1, &(0x7f0000000040)=[{&(0x7f0000000280)=""/156, 0x9c}, {&(0x7f0000000340)=""/209, 0xd1}, {&(0x7f0000000440)=""/4096, 0x1000}], 0x3, 0x6, 0xd6) [ 1003.950469][T29859] FAT-fs (loop4): Directory bread(block 6) failed [ 1003.986892][T29868] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 07:21:58 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab59362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6c33ac7f7e58f57cb6c37e89f0e036126b592ecb1c4e841590662b9aaabd775c5"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) [ 1004.020936][T29868] EXT4-fs (loop1): orphan cleanup on readonly fs [ 1004.028857][T29868] EXT4-fs error (device loop1): ext4_orphan_get:1264: comm syz-executor.1: bad orphan inode 33554432 [ 1004.050536][T29873] EXT4-fs (loop5): error: could not find journal device path: error -2 07:21:58 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) [ 1004.081757][T29868] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 1004.136123][T29883] FAT-fs (loop4): Unrecognized mount option "6J3Ufg?G8>}jˉ;q~‡^**ȉ5"{1Pu|ltTwSi" or missing value 07:21:59 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000003c0)="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", 0x11e}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000000)={[], [{@smackfsfloor={'smackfsfloor', 0x3d, 'vfat\x00'}}, {@uid_gt={'uid>', 0xee00}}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x7ff, 0x1, 0xe6, 0x7}, {0x0, 0x81, 0x25, 0xaa}, {0x1f, 0x1f, 0xa3, 0x8}, {0x1, 0x26, 0x5, 0x2}]}) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000100)={r2}) 07:21:59 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000602000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:21:59 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000110001000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:21:59 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:59 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000300)={'filter\x00', 0x0, [0x1f, 0x8, 0x6]}, &(0x7f0000000380)=0x44) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@bridge_delneigh={0x28, 0x1c, 0xd03, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x2}, [@NDA_LLADDR={0xa, 0x2, @link_local}]}, 0x28}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xf, 0x8, &(0x7f0000000000)=@raw=[@btf_id={0x18, 0x4, 0x3, 0x0, 0x1}, @exit, @btf_id={0x18, 0xa, 0x3, 0x0, 0x4}, @jmp={0x5, 0x0, 0xc, 0x5, 0x5, 0x0, 0xfffffffffffffff4}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @ldst={0x1, 0x2, 0x2, 0xb, 0x4, 0xfffffffffffffff8, 0xffffffffffffffe7}], &(0x7f0000000040)='GPL\x00', 0xfffff611, 0x0, 0x0, 0x41100, 0x10, '\x00', r2, 0x6, r0, 0x8, &(0x7f0000000140)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000180)={0x3, 0x7, 0x1, 0x56443277}, 0x10, 0xffffffffffffffff, r0}, 0x78) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x20, &(0x7f0000000080)) [ 1004.585635][ T22] audit: type=1326 audit(1621927319.077:494): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29839 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7fc00000 [ 1004.634347][ T22] audit: type=1326 audit(1621927319.077:495): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29839 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=16 compat=0 ip=0x4665d9 code=0x7fc00000 [ 1004.671909][T29907] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 07:21:59 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETNODEID(0xffffffffffffffff, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:59 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:59 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000120001000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) [ 1004.692925][T29904] EXT4-fs (loop5): error: could not find journal device path: error -2 [ 1004.731381][T29907] EXT4-fs (loop1): orphan cleanup on readonly fs 07:21:59 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) mkdirat(r1, &(0x7f0000000000)='./file0/file0\x00', 0x22) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)) 07:21:59 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETNODEID(0xffffffffffffffff, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:21:59 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) [ 1004.753179][T29907] EXT4-fs error (device loop1): ext4_orphan_get:1264: comm syz-executor.1: bad orphan inode 33554432 [ 1004.776589][T29907] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 1004.857149][T29929] FAT-fs (loop4): Directory bread(block 6) failed [ 1004.860993][T29936] EXT4-fs (loop5): error: could not find journal device path: error -2 [ 1005.573435][ T22] kauditd_printk_skb: 58 callbacks suppressed [ 1005.573444][ T22] audit: type=1326 audit(1621927320.067:554): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29912 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7fc00000 07:22:00 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000003c0)="eb3c908000db013f04f93189ac3bae4612797b8bfdb878cecd3783b29fe17fdafdd3badc9a117904abbc4af117fd8c1a3e7ce3965076dccd3ef1a0ba838bd2d60e20ce940938377e9444ba54bc8c0e00d8a46f55e575d22ed65070834f88104b0d4e43c8e93c6c393762655c8ca7a865cef5aba2bc74a8f61517e4af5ad65d798d1556e52f6c85c7441ecfd9c3627b7367da5fb5ef8b122a64e11d1b26aed963dc12a40bf052a1cbdc06c577b6933a64ab671004242fdc078b82bcfae766a4a06215f3ba903bf6ccc14afc609b05316d3c60a8da9e192a8fd84cdd73072b08285143312b681a0105901c406adc3fc51aba8f1c1d140be25a691e5de77920b2f65484b7e725b31e9c6afa218b87f8d3c4dfa440594613ae10829c856c6e52", 0x11e}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000000)={[], [{@smackfsfloor={'smackfsfloor', 0x3d, 'vfat\x00'}}, {@uid_gt={'uid>', 0xee00}}]}) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000100)={r2}) 07:22:00 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000702000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:22:00 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETNODEID(0xffffffffffffffff, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:00 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') r2 = fcntl$dupfd(r1, 0x0, r1) r3 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0xee01, r4, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x2000, &(0x7f00000002c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x81}}, {}, {@allow_other}, {@max_read={'max_read', 0x3d, 0x100000000}}, {@allow_other}, {@default_permissions}, {@default_permissions}], [{@uid_gt={'uid>', r4}}, {@euid_eq}]}}) write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) openat(r1, &(0x7f0000000000)='./file0\x00', 0xc0, 0x48) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)) 07:22:00 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000180001000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:22:00 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) [ 1005.611105][ T22] audit: type=1326 audit(1621927320.067:555): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29912 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=16 compat=0 ip=0x4665d9 code=0x7fc00000 07:22:00 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) [ 1005.680561][T29958] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 1005.691371][T29959] FAT-fs (loop4): Directory bread(block 6) failed [ 1005.699171][T29957] EXT4-fs (loop5): error: could not find journal device path: error -2 [ 1005.723087][T29958] EXT4-fs (loop1): orphan cleanup on readonly fs 07:22:00 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0xffffd000) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000000)='cpuset.memory_pressure\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)) 07:22:00 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:00 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab59362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6c33ac7f7e58f57cb6c37e89f0e036126b592ecb1c4e841590662b9aaabd775c5"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) [ 1005.749339][T29958] EXT4-fs error (device loop1): ext4_orphan_get:1264: comm syz-executor.1: bad orphan inode 33554432 [ 1005.762818][T29958] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 07:22:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000802000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 1005.934110][T29990] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 1005.966051][T29990] EXT4-fs (loop1): orphan cleanup on readonly fs [ 1005.972502][T29990] EXT4-fs error (device loop1): ext4_orphan_get:1264: comm syz-executor.1: bad orphan inode 33554432 [ 1005.983938][T29990] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 1006.512309][ T22] audit: type=1326 audit(1621927321.007:556): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29954 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7fc00000 [ 1006.537941][ T22] audit: type=1326 audit(1621927321.007:557): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29954 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=16 compat=0 ip=0x4665d9 code=0x7fc00000 [ 1006.563950][ T22] audit: type=1326 audit(1621927321.007:558): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29954 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7fc00000 [ 1006.589232][ T22] audit: type=1326 audit(1621927321.007:559): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29954 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7fc00000 [ 1006.614449][ T22] audit: type=1326 audit(1621927321.007:560): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29954 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7fc00000 [ 1006.639720][ T22] audit: type=1326 audit(1621927321.007:561): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29954 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7fc00000 07:22:01 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000100)={r2}) 07:22:01 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:01 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000220001000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:22:01 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:01 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) preadv(r1, &(0x7f0000000280), 0x0, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)) preadv(r0, &(0x7f0000002500)=[{&(0x7f0000000000)=""/72, 0x48}, {&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/147, 0x93}, {&(0x7f0000000140)=""/124, 0x7c}, {&(0x7f0000001340)=""/111, 0x6f}, {&(0x7f00000013c0)=""/232, 0xe8}, {&(0x7f00000014c0)=""/4096, 0x1000}, {&(0x7f00000024c0)=""/24, 0x18}], 0x8, 0x3ff, 0x420) 07:22:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000902000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 1006.666104][ T22] audit: type=1326 audit(1621927321.007:562): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29954 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7fc00000 [ 1006.691081][ T22] audit: type=1326 audit(1621927321.007:563): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29954 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7fc00000 07:22:01 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:01 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) [ 1006.795486][T30000] EXT4-fs (loop5): error: could not find journal device path: error -2 [ 1006.795527][T30001] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 1006.818142][T30003] FAT-fs (loop4): Directory bread(block 6) failed 07:22:01 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000250001000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:22:01 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800001, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sysvipc/msg\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140), r0) sendmsg$TIPC_CMD_SET_LINK_TOL(r1, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x68, r2, 0x800, 0x70bd27, 0x25dfdbfc, {{}, {}, {0x4c, 0x18, {0x308, @media='udp\x00'}}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0xcd1}, 0x800) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)) [ 1006.846118][T30001] EXT4-fs (loop1): orphan cleanup on readonly fs [ 1006.852867][T30001] EXT4-fs error (device loop1): ext4_orphan_get:1264: comm syz-executor.1: bad orphan inode 33554432 [ 1006.864555][T30001] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 07:22:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000a02000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:22:01 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab59362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6c33ac7f7e58f57cb6c37e89f0e036126b592ecb1c4e841590662b9aaabd775c5"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) [ 1006.981784][T30027] EXT4-fs (loop5): error: could not find journal device path: error -2 [ 1007.038395][T30035] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 1007.057034][T30035] EXT4-fs (loop1): orphan cleanup on readonly fs [ 1007.068300][T30035] EXT4-fs error (device loop1): ext4_orphan_get:1264: comm syz-executor.1: bad orphan inode 33554432 [ 1007.092619][T30035] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 07:22:02 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x380) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x2, &(0x7f0000000000)={[{@shortname_winnt}, {@utf8}, {@shortname_mixed}, {@utf8no}, {@uni_xlate}, {@rodir}]}) 07:22:02 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) 07:22:02 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000100)={r2}) 07:22:02 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:02 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f0000000100000000002e0001000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:22:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000b02000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:22:02 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) 07:22:02 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca00c2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab5d362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) [ 1007.696171][T30052] FAT-fs (loop4): bogus number of reserved sectors [ 1007.703379][T30058] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 1007.714876][T30052] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1007.733648][T30054] EXT4-fs (loop5): error: could not find journal device path: error -2 07:22:02 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:02 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:02 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000480001000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) [ 1007.754832][T30058] EXT4-fs (loop1): orphan cleanup on readonly fs [ 1007.762408][T30058] EXT4-fs error (device loop1): ext4_orphan_get:1264: comm syz-executor.1: bad orphan inode 33554432 [ 1007.793222][T30058] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 07:22:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000c02000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:22:02 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000000)='#{]\\/+!)-\x00', &(0x7f0000000040)='./file0\x00', r0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)) 07:22:02 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) [ 1007.895931][T30086] EXT4-fs (loop5): error: could not find journal device path: error -2 [ 1007.982868][T30095] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 1007.992460][T30094] FAT-fs (loop4): Directory bread(block 6) failed [ 1008.014301][T30095] EXT4-fs (loop1): orphan cleanup on readonly fs [ 1008.032734][T30095] EXT4-fs error (device loop1): ext4_orphan_get:1264: comm syz-executor.1: bad orphan inode 33554432 [ 1008.056074][T30095] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 07:22:03 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab59362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6c33ac7f7e58f57cb6c37e89f0e036126b592ecb1c4e841590662b9aaabd775c5"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca00c2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab5d362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:03 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000100)={r2}) 07:22:03 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab59362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6c33ac7f7e58f57cb6c37e89f0e036126b592ecb1c4e841590662b9aaabd775c5"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:03 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f0000000100000000004c0001000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:22:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000d02000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:22:03 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendfile(r0, r0, &(0x7f0000000140)=0xb8d7, 0x1) readv(r0, &(0x7f0000002500)=[{&(0x7f0000000280)=""/106, 0x6a}, {&(0x7f0000000300)=""/4096, 0x1000}, {&(0x7f0000000180)=""/61, 0x3d}, {&(0x7f0000001300)=""/35, 0x23}, {&(0x7f0000001340)=""/65, 0x41}, {&(0x7f00000013c0)=""/4096, 0x1000}, {&(0x7f00000023c0)=""/139, 0x8b}, {&(0x7f0000002480)=""/70, 0x46}], 0x8) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000000)={'nat\x00'}, &(0x7f0000000240)=0x54) r2 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000000)={'nat\x00'}, &(0x7f0000000240)=0x54) r3 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r3, 0x0, 0x40, &(0x7f0000000000)={'nat\x00'}, &(0x7f0000000240)=0x54) bind(r3, &(0x7f00000026c0)=@pppoe={0x18, 0x0, {0x3, @local, 'veth0_to_bridge\x00'}}, 0x80) getsockopt$IPT_SO_GET_INFO(r3, 0x0, 0x40, &(0x7f0000002580)={'nat\x00', 0x0, [0x7, 0x3, 0x4, 0x0, 0x7ff]}, &(0x7f0000002600)=0x54) poll(&(0x7f0000000000)=[{r1, 0x8200}, {r2, 0x2080}], 0x2, 0x8) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000002640)=ANY=[@ANYBLOB="47c5a92800008ad10ece7052f1edd5002316a79dc2a316aa671d299c8b4f0e0405d55d0a000000000000052fefd988ab0a9cee6d55307ca8490e83dce6dcd557d9a3af10d5c98e2e6f08aaa41fb14a0fb90e783d121b125881c5270fe431bea73f4071"]) 07:22:03 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:03 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) [ 1008.577514][T30110] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 1008.603777][T30114] FAT-fs (loop4): Unrecognized mount option "Gũ(" or missing value [ 1008.615559][T30112] EXT4-fs (loop5): error: could not find journal device path: error -2 07:22:03 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000600001000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:22:03 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:03 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca00c2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab5d362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) [ 1008.630205][T30110] EXT4-fs (loop1): orphan cleanup on readonly fs [ 1008.642725][T30110] EXT4-fs error (device loop1): ext4_orphan_get:1264: comm syz-executor.1: bad orphan inode 33554432 [ 1008.656987][T30110] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 07:22:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000e02000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:22:03 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) [ 1008.710229][T30132] FAT-fs (loop4): Unrecognized mount option "Gũ(" or missing value [ 1008.801889][T30141] EXT4-fs (loop5): error: could not find journal device path: error -2 [ 1008.819727][T30144] EXT4-fs (loop1): bad geometry: block count 526 exceeds size of device (525 blocks) [ 1008.925847][T30144] EXT4-fs (loop1): bad geometry: block count 526 exceeds size of device (525 blocks) 07:22:03 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000100)={r2}) 07:22:03 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:03 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6bcc"]) 07:22:03 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:03 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000680001000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:22:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000f02000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:22:03 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:03 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:04 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:04 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) [ 1009.464539][T30160] FAT-fs (loop4): Unrecognized mount option "kLF" or missing value [ 1009.478154][T30165] EXT4-fs (loop5): error: could not find journal device path: error -2 [ 1009.491267][T30164] EXT4-fs (loop1): bad geometry: block count 527 exceeds size of device (525 blocks) 07:22:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000001002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:22:04 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) [ 1009.656107][T30193] EXT4-fs (loop1): bad geometry: block count 528 exceeds size of device (525 blocks) 07:22:04 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000100)={r2}) 07:22:04 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f0000000100000000006c0001000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:22:04 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x1df) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="963a5a923116"]) 07:22:04 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:04 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab59362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6c33ac7f7e58f57cb6c37e89f0e036126b592ecb1c4e841590662b9aaabd775c5"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca00c2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab5d362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6c33ac7f7e58f57cb6c37e89f0e036126b592ecb1c4e84159"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000001102000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:22:04 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:04 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:04 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000740001000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:22:04 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) [ 1010.344564][T30206] EXT4-fs (loop5): error: could not find journal device path: error -2 [ 1010.347300][T30204] FAT-fs (loop4): Unrecognized mount option ":Z1" or missing value [ 1010.354151][T30207] EXT4-fs (loop1): bad geometry: block count 529 exceeds size of device (525 blocks) 07:22:04 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:04 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) [ 1010.468145][T30207] EXT4-fs (loop1): bad geometry: block count 529 exceeds size of device (525 blocks) [ 1010.587849][T30226] EXT4-fs (loop5): error: could not find journal device path: error -2 [ 1011.161138][ T22] kauditd_printk_skb: 130 callbacks suppressed [ 1011.161148][ T22] audit: type=1326 audit(1621927325.658:694): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=30198 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7fc00000 [ 1011.193880][ T22] audit: type=1326 audit(1621927325.658:695): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=30198 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=16 compat=0 ip=0x4665d9 code=0x7fc00000 [ 1011.219204][ T22] audit: type=1326 audit(1621927325.658:696): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=30198 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7fc00000 [ 1011.244208][ T22] audit: type=1326 audit(1621927325.658:697): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=30198 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7fc00000 [ 1011.269079][ T22] audit: type=1326 audit(1621927325.658:698): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=30198 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7fc00000 [ 1011.294393][ T22] audit: type=1326 audit(1621927325.658:699): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=30198 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7fc00000 [ 1011.320679][ T22] audit: type=1326 audit(1621927325.658:700): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=30198 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7fc00000 [ 1011.345817][ T22] audit: type=1326 audit(1621927325.658:701): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=30198 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7fc00000 [ 1011.370934][ T22] audit: type=1326 audit(1621927325.658:702): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=30198 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7fc00000 07:22:05 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000100)={r2}) 07:22:05 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab59362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6c33ac7f7e58f57cb6c37e89f0e036126b592ecb1c4e841590662b9aaabd775c5"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:05 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x802, 0x0) write$binfmt_elf64(r3, &(0x7f0000000880)={{0x7f, 0x45, 0x4c, 0x46, 0x9e, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x221, 0x40, 0x36, 0x9d9, 0x9, 0x38, 0x0, 0x9, 0xd0}, [{0x60000003, 0x0, 0x992f, 0x9, 0x0, 0x0, 0x0, 0x8}, {0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x5, 0x96}], "a74aefa6ae322bd2c90a8c39a8e102213765d982a69a4a8b7b7b06159ae5f0a06d04dc57730fd181baae533cb38128e4ba71ace2058bf377fdee126d50e047e7b4c35026b94ca2f3597047992d9b3ca19c38232b047cf81df2e0161f49d41669157ec38c1bef0fc681a5737a8fbdaa851986f8ab86ac7389f96aaa0c9b71e0e5a25ba51a3084bf5e87a8ab8937bbc4e3b234e2bfed011a344498fb50e377331b32abeda6983c8cb0e48a73be76719dafea3c57557474f306d07f06c2cd0342bb7a4817cc1d7e13d57015a4694ddea9c55184a89c6207699bcf708a337c3e0135a050f172b762e5e13c", ['\x00', '\x00', '\x00', '\x00']}, 0x599) sendfile(r3, r2, 0x0, 0x7ffff000) dup2(r2, r3) r4 = creat(&(0x7f0000000080)='./file0\x00', 0x120) r5 = syz_genetlink_get_family_id$fou(&(0x7f0000000180), r4) sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="66c77185c9d338110d11b3e7c10f73cf2049b624cca187b556fe1754cc1fe9e8abc165b24ffc90bf8cc7a60a34186400e1a887675d06510346353d57720200816a07f88cb7abfddf2bc780708958a94afce69685b8290bc246f613594aeec6a518177d101196ef651d4dd530fe31c591bed2435da400b5cd440eed001b096a58d4226786e872b38f78baa983b465603400f1b422c18aa3bdc5223e58e9112f23bca4e66e8a8bd6b8fd8009aad35b466a37fb7d5cd64b8b3b413e18327f42a78227ad1953fcdcb764ab8925a29c410613516f4c3235d3aee15b90e126", @ANYRES16=r5], 0x3c}}, 0x4000) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x38, r5, 0x10, 0x70bd26, 0x25dfdbff, {}, [@FOU_ATTR_LOCAL_V4={0x8, 0x6, @private=0xa010100}, @FOU_ATTR_AF={0x5, 0x2, 0x2}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_AF={0x5, 0x2, 0x2}, @FOU_ATTR_PEER_V4={0x8, 0x8, @private=0xa010100}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000000}, 0x5) r6 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000400), 0x101000, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r6, 0x6, 0x14, &(0x7f0000000440)=0x1, 0x4) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000140)={'L-', 0x7}, 0x16, 0x0) 07:22:05 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000001202000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:22:05 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f0000000100000000007a0001000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) [ 1011.396194][ T22] audit: type=1326 audit(1621927325.658:703): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=30198 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7fc00000 07:22:06 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000001402000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:22:06 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:06 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab59362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6c33ac7f7e58f57cb6c37e89f0e036126b592ecb1c4e841590662b9aaabd775c5"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) [ 1011.483438][T30243] EXT4-fs (loop1): bad geometry: block count 530 exceeds size of device (525 blocks) [ 1011.520489][T30248] EXT4-fs (loop5): error: could not find journal device path: error -2 07:22:06 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000fc0001000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:22:06 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) [ 1011.575466][T30255] FAT-fs (loop4): Directory bread(block 6) failed [ 1011.660378][T30264] EXT4-fs (loop1): bad geometry: block count 532 exceeds size of device (525 blocks) [ 1011.719445][T30277] EXT4-fs (loop5): error: could not find journal device path: error -2 07:22:06 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000100)={r2}) 07:22:06 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:06 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000002202000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:22:06 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000b60101000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:22:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="687cf99ea026eea1d29db600b50cdf562e6e1e306435bfc2cc7b95cea15968f944b0a773e135f8d4b92dc08fb4ae797230c05b1b0f3b"]) 07:22:06 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab59362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6c33ac7f7e58f57cb6c37e89f0e036126b592ecb1c4e841590662b9aaabd775c5"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca00c2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab5d362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6c33ac7f7e58f57cb6c37e89f0e036126b592ecb1c4e841590662b9aaabd7"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:06 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:06 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab59362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6c33ac7f7e58f57cb6c37e89f0e036126b592ecb1c4e841590662b9aaabd775c5"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:06 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000b70101000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) [ 1012.404011][T30294] EXT4-fs (loop5): error: could not find journal device path: error -2 [ 1012.420930][T30297] FAT-fs (loop4): Unrecognized mount option "h|&ҝ" or missing value [ 1012.423023][T30298] EXT4-fs (loop1): bad geometry: block count 546 exceeds size of device (525 blocks) 07:22:07 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:07 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) [ 1012.620555][T30298] EXT4-fs (loop1): bad geometry: block count 546 exceeds size of device (525 blocks) [ 1012.667876][T30323] EXT4-fs (loop5): error: could not find journal device path: error -2 07:22:07 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000100)={r1}) 07:22:07 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:07 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="01"]) 07:22:07 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000002502000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:22:07 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000040201000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:22:07 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:07 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca00c2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab5d362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6c33ac7f7e58f57cb6c37e89f0e036126b592ecb1c4e841590662b9aaabd775c5"], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:07 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000000301000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:22:07 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) [ 1013.330174][T30335] FAT-fs (loop4): Unrecognized mount option "" or missing value [ 1013.345045][T30336] EXT4-fs (loop5): error: could not find journal device path: error -2 [ 1013.358700][T30339] EXT4-fs (loop1): bad geometry: block count 549 exceeds size of device (525 blocks) 07:22:07 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca00c2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab5d362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6c33ac7f7e58f57cb6c37e89f0e036126b592ecb1c4e841590662b9aaabd775c5"], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:07 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000002780)='/proc/self/exe\x00', 0x0, 0x24) lsetxattr$security_ima(&(0x7f00000026c0)='./file0/file0\x00', &(0x7f0000002700), &(0x7f0000002740)=@ng={0x4, 0x2, "1c3850b98421"}, 0x8, 0x1) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) copy_file_range(0xffffffffffffffff, &(0x7f0000002400)=0x5, r1, 0x0, 0x80000001, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000002500)=ANY=[@ANYBLOB="02124e52652963f700005e54fbcbae556e73fb0c42afb9101a6e4fa5c84f9061498ca6306525837b03eb54fb61c16665ba4b040900"], 0x11, 0x1) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040), 0x10100, 0x0) read$FUSE(r2, &(0x7f0000000280)={0x2020}, 0x2020) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = dup3(r2, r2, 0x0) preadv(r3, &(0x7f0000002600), 0x0, 0x6, 0x9) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)) write$tcp_mem(0xffffffffffffffff, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000022c0)={'virt_wifi0\x00', 0x0}) sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000024c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000027c0)={&(0x7f0000002800)={0x188, 0x12, 0x100, 0x70bd2b, 0x25dfdbfb, {0x4, 0xf, 0x3, 0x20, {0x4e23, 0x4e24, [0x1, 0x9, 0x6, 0x2], [0x1000, 0x8, 0x2, 0x4], r4, [0x40, 0x800]}, 0x3, 0x100}, [@INET_DIAG_REQ_BYTECODE={0x48, 0x1, "5a8ee39691e599586ebb42117698372988f20551d84723db37e3cf2bffe83323cdc6766a96b30c3291616db3ed3e7c170d14f4092c3bc5b3f62e3ec38f098cd943f8af33"}, @INET_DIAG_REQ_BYTECODE={0xf3, 0x1, "c6c282a04bb8413c316fc2ecc860fbd0e7297972c760edb5e21c1f46e8407e9791d688e2baafd31a6b0ffd9ea5127173b4a6ef2cbf8fc87a8151b5590c9c136e0696f00b891983072575fd6686decc32d2a4dcab16596d07ec17338329ba24100b7308b0335cdf5680e74c6d6b8363aa9593b0fc392645ee7c842fcc3298592bb503e57cae3e1e18ffde759feb33a8b4ae11acb5c1b861be46c8cd4271008f49702e2ac8938cb64bea7303346fe73e66eb1db983730e5e21bdb02ce5cfc2d88a99570a46091e85039afb118d5fb49568b9f5e0c63ffedd0dcf8a5bbfef74d42f5717746d1876b90b739ffff2a5d5dd"}]}, 0x188}, 0x1, 0x0, 0x0, 0x4000080}, 0x20008041) r5 = open(&(0x7f0000002640)='\x00', 0x40, 0xa) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240), 0x1, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000002680)=0xb) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f0000002300)={{}, {@void, @max}}) [ 1013.540332][T30362] EXT4-fs (loop5): error: could not find journal device path: error -2 [ 1013.546069][T30364] FAT-fs (loop4): Directory bread(block 6) failed [ 1013.605941][T30364] FAT-fs (loop4): Directory bread(block 6) failed 07:22:08 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000100)={r1}) 07:22:08 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab59362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6c33ac7f7e58f57cb6c37e89f0e036126b592ecb1c4e841590662b9aaabd775c5"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000002e02000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:22:08 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:08 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000020401000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:22:08 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000), 0x20000, 0x0) r2 = dup(r0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000280)={0x1ff, 0x3e, 0x4, 0x0, 0x0, [{{r1}, 0x100}, {{r2}, 0x94}, {{r0}, 0x10000}, {{r0}, 0x1}]}) write(r0, &(0x7f0000000340)="fbf6123aa8a550fd8f838f0f6fc8adddb7127fc32423ace06da9436687496c9d4e5c37d0af090f712df3c1b62b01b064c5761783ce0fb2660e423abd663d2fbaf61bd26b89b601e8a6590cdfb1382d4b1db18c28b50ff890eb5c568f59826e0789381b078f246155f32f25f8e90f5f08dc0e236622f6725ca0b6b00fae24ffc44a478a1e5ab4c25f78f5ec4f81c89e61d7b35821ca244cd29a0d72ebe987139fb656654ac447d89da61716849faef08a9c5b6203c644f71a6769b32fa958560d62ef7a46f2f6d00ca8670d97832b0fc72d025f704044dfe4f169111475d5", 0xde) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)) ioctl$KVM_SET_XSAVE(0xffffffffffffffff, 0x5000aea5, &(0x7f0000000440)={[0x3ff, 0xbe5d2778, 0x40000000, 0x6, 0x8, 0x1000, 0x21d, 0x8, 0x8, 0x8, 0x8, 0x5, 0x2, 0x7fff, 0x7, 0xffffffff, 0xff, 0x10000, 0x10001, 0xffff7fff, 0x41b9, 0x5, 0x1, 0x7, 0x9, 0x2, 0x5, 0x4, 0x3, 0x2, 0x1f, 0x8, 0x4, 0x3, 0x9fbc, 0xffffffff, 0x6, 0x0, 0x5, 0xbb, 0xb8, 0x1, 0x7, 0x0, 0x6, 0x7fff, 0x1, 0x1, 0xfffffe00, 0x25c97491, 0x1f, 0x42, 0x1, 0xff, 0x0, 0x40000, 0x7, 0x80000000, 0x0, 0x5, 0x7, 0x6, 0x0, 0x800, 0x48, 0xfffffffc, 0x1, 0x7, 0x80000001, 0x2, 0x1, 0xfffffffa, 0x3, 0x10000, 0x2, 0x1, 0x3, 0x2, 0x5, 0x4, 0x3, 0x2, 0x0, 0x6, 0x6ebc, 0x1, 0x1000, 0x101, 0x7, 0x4, 0x9, 0x8, 0x1, 0x4, 0x4f, 0x2, 0x4, 0x6, 0x5, 0x20000, 0x0, 0x1f, 0x8000, 0x7f, 0x7, 0x7, 0xffffffff, 0x101, 0x0, 0xa91, 0x4c8e, 0x9, 0x5, 0x80000000, 0x8, 0x4, 0x5, 0x53, 0x3d6, 0x20, 0x3ff, 0x1, 0x6, 0x8, 0x1, 0x0, 0x10001, 0x200, 0x1, 0xff, 0x40, 0x1, 0xea4, 0x5, 0x7, 0x717a, 0x2, 0x2, 0x607, 0x5, 0xcb, 0xfff, 0x8, 0x3, 0x8, 0x401, 0xff, 0x0, 0x0, 0xffff, 0x7b, 0x40, 0x3, 0x8, 0x1000, 0x200, 0x40000, 0x80000001, 0x9, 0x5, 0x5, 0x0, 0x7, 0x1, 0x5, 0x81, 0x80000001, 0x7e, 0x75a0, 0x1, 0x6, 0x90000, 0x1000, 0x0, 0x6, 0x7, 0x101, 0x10000, 0x0, 0x7f, 0x1, 0x3, 0x40, 0x9996, 0x1ff, 0x4, 0x9, 0x10000, 0x3, 0xe000000, 0x10001, 0x1, 0x2, 0x9, 0x20, 0x6, 0x30c, 0x1b0efa92, 0x400, 0x1, 0x0, 0x1, 0xac, 0x3e, 0x6fd, 0x4, 0x4, 0x1, 0x4, 0x9, 0x8, 0x3, 0x96d, 0x1, 0x0, 0x7fff, 0x7fff, 0xffffffff, 0x9, 0x3, 0x0, 0x6, 0x1, 0x7ff, 0x3, 0x1, 0x8001, 0x6, 0x8, 0x3, 0xa1, 0x9, 0xfffffffb, 0x7fffffff, 0x2a6, 0x7f8000, 0x8, 0x7, 0x40, 0x8, 0x0, 0x2, 0xfffff801, 0x100, 0x5, 0x44, 0x3, 0x10001, 0x3a7, 0x1000, 0xfffffffd, 0x100, 0xffffffe1, 0x9, 0x6, 0x3ff, 0x5, 0x80, 0x10000, 0x8000, 0x0, 0x4000, 0x1, 0x8, 0x81, 0x9, 0xa2d, 0x1, 0xffffffff, 0xffffffff, 0x8, 0x8, 0xfffffffa, 0x1f, 0x7a3, 0x81, 0x3, 0x584, 0x7ff, 0x2, 0x6, 0x5, 0x8, 0x9, 0xfffffffd, 0x0, 0xd2, 0x2, 0x5, 0x5, 0x7, 0x216, 0x20, 0x6, 0x2, 0xffff, 0x9b, 0x4, 0x4a2321cd, 0x8001, 0x5, 0x3, 0x7, 0x3, 0x80000000, 0x89f, 0x4, 0xe3c, 0x100, 0x7, 0xfffffff8, 0x4, 0x8, 0x9, 0x4661, 0x8, 0x7f, 0x8000, 0x3, 0xffffffff, 0x4, 0x1, 0x6, 0x101, 0x1, 0x6, 0x480, 0x3, 0x7, 0x5, 0x5, 0x0, 0x5, 0x8, 0xac1, 0x7fff, 0x9, 0x0, 0x10001, 0xfff, 0x1a, 0x2000000, 0x10000, 0x500000, 0x2, 0x10001, 0x1, 0x401, 0x0, 0x55b, 0x8, 0x7, 0x6, 0x80000, 0x4, 0x3, 0x90000000, 0x7, 0xffff, 0x9, 0xf99e, 0x1, 0x10000, 0x2, 0x9a6e, 0x0, 0x6c1d5937, 0x2, 0x1f, 0x1000, 0x3, 0xbc2, 0x1, 0x6, 0xffffffff, 0xffff0001, 0x7, 0x6, 0x7, 0xbb1a, 0xfffffff9, 0xc9f, 0x7, 0x3, 0x3, 0xfffffffc, 0x0, 0x81, 0x0, 0x0, 0x9, 0x8000, 0x1, 0x6, 0x6, 0x1d2, 0x800, 0x3, 0x2, 0x1ff, 0x200, 0xffff, 0x80, 0x81, 0xdf27, 0xffff, 0x72c5, 0x100, 0x4, 0x400, 0x10000, 0xfff, 0x400, 0x2, 0x1, 0x10001, 0x9, 0x7, 0xb2, 0x80000001, 0x6, 0xffffffc0, 0x1, 0x1, 0x80, 0xffffffff, 0x3, 0x7, 0x1f, 0x1, 0x6f08, 0x9, 0x3f, 0x7, 0xfff, 0x2, 0x3, 0xffff, 0x5, 0x5, 0x5f, 0x5, 0x400, 0x1, 0x1ff, 0x3, 0x0, 0x0, 0x58c2, 0x3ff, 0xaf, 0xb76a, 0x9, 0x9, 0x20, 0xff, 0x2, 0x0, 0x0, 0xffffffff, 0x3000, 0x4, 0x20000000, 0x10001, 0x5, 0xee, 0x6, 0x8, 0x101, 0x3ff, 0x120b, 0x8, 0x9, 0x4, 0x6, 0x7fffffff, 0x5, 0x8, 0x401, 0x1, 0x3f, 0x7, 0x0, 0x3, 0x3, 0x3, 0x5, 0x6, 0x80000000, 0xffffff16, 0x2f92, 0x3f, 0x9, 0x4, 0x6, 0x0, 0x7, 0xfffff000, 0x9, 0xf1, 0x76c, 0xce, 0x1, 0x1, 0x8, 0x0, 0x4, 0x1000, 0x0, 0x7, 0x7, 0x7, 0x7, 0x80000000, 0x5, 0xa84, 0x5, 0xa1, 0x80000000, 0x80000000, 0x0, 0x3, 0x3, 0x1f, 0x7fffffff, 0x4, 0x1, 0x1, 0x7, 0x0, 0x7ff, 0x7fff, 0x7, 0xfff, 0x8, 0x10001, 0xc1fa, 0x7, 0x7b, 0x9, 0x28, 0xffffffff, 0x6dc, 0x80000001, 0xffff, 0x0, 0x82da, 0x5, 0x7, 0x1, 0x7fffffff, 0x4, 0x1f, 0x4, 0x0, 0x6, 0x16a, 0x2f2, 0x8, 0x0, 0x3, 0x0, 0x3, 0x3, 0x3ff, 0xff, 0x1, 0x3, 0x7, 0x4, 0x3f, 0x6, 0x1000, 0xc04, 0x7f, 0x8, 0x5, 0x2, 0x5, 0x6, 0x0, 0x8, 0x1ff, 0x2, 0xffffffff, 0x100, 0x23, 0xffff8000, 0xfffffffb, 0x3f, 0x400, 0x0, 0x5, 0x7, 0x80000000, 0x0, 0xff, 0x4, 0x9, 0xf8000000, 0x8, 0xba, 0x9, 0x0, 0x10001, 0x5, 0x2, 0x0, 0x4, 0x7, 0x8, 0xaa, 0x800, 0x5, 0x7, 0x78d7, 0x9, 0x1, 0x2, 0x401, 0x4, 0x0, 0x4, 0x2, 0x1, 0xad, 0xfffffff8, 0x40, 0x200, 0xffffffff, 0x0, 0x7fff, 0x79dc, 0x80000001, 0x0, 0xffffffff, 0x7, 0x9, 0x10001, 0x48000000, 0x3ff, 0x0, 0x84c7, 0xa5e7, 0xd0, 0x7, 0xf111, 0x0, 0x4, 0xb4, 0xd913, 0x7e82, 0x401, 0x95, 0x7, 0x8, 0xef1, 0x7fff, 0x81, 0x80000001, 0x5, 0xc07f, 0x51, 0xfffff71e, 0xffffff81, 0x1ff, 0x5, 0x3ff, 0x5, 0x4, 0x5, 0xa7, 0x7ff, 0x1, 0x1, 0x8, 0x2, 0x9, 0x1, 0x13, 0x2, 0x6, 0xfffffff9, 0x17, 0x6052c9aa, 0x2, 0x0, 0x10001, 0x4, 0xffffffff, 0xfff, 0x98f8, 0x8001, 0x84, 0x47d5, 0xd0c7, 0x7fff, 0x1, 0xfaaf, 0x3f, 0x5, 0x40, 0x4, 0x9, 0xf58, 0x4, 0x0, 0x9, 0x8001, 0x4, 0x7, 0x400, 0x6, 0x9, 0x100, 0x81, 0x1000, 0x1, 0x8, 0x58, 0x5b, 0x81, 0x962eb77, 0x3, 0x8, 0x5, 0x5, 0x81, 0xfc, 0x8, 0xffffffff, 0x100, 0x2, 0x7, 0x1, 0x10001, 0x0, 0x3, 0x6, 0x7, 0x9, 0x6, 0x3, 0x1, 0x9, 0xffffffff, 0xffff8001, 0x5, 0x7fffffff, 0x6, 0xffffff6c, 0x4, 0xffa0, 0x0, 0x5, 0x4, 0x1f, 0x45, 0x7, 0x8, 0x2, 0x3, 0x3f, 0x4e4, 0xfffffffb, 0x6, 0x4, 0x8000, 0x6, 0x4, 0xffffffff, 0x1777, 0x3, 0x3ff, 0x1f, 0x10001, 0xffff, 0x9, 0x1, 0x5, 0xfffff001, 0xd01, 0x4, 0x5d, 0xe0000, 0x0, 0x4, 0x2, 0xfffffffc, 0x4, 0x5, 0x4, 0x5, 0x4, 0x6, 0x400, 0x9, 0xed, 0x8000, 0x8, 0x0, 0x1f, 0x0, 0x9, 0x9, 0xffffffff, 0x3, 0x4a3, 0x400, 0x2, 0x9, 0x3f, 0x4, 0x0, 0x81, 0x2, 0x1000, 0x0, 0x0, 0x40, 0x3, 0xfff, 0x6, 0xffff, 0x3ff, 0xe3f, 0x9, 0x2, 0x40, 0x4, 0xfffff8b5, 0x9, 0x6, 0x8, 0x5, 0x8, 0x6, 0x7, 0x1000, 0x10000, 0x5f9, 0xfff, 0xffffcc9d, 0x85, 0x80, 0x0, 0x4, 0x7, 0x5, 0x8, 0x3, 0x5, 0x3, 0x9, 0x4, 0x9, 0x2, 0x9cb4, 0x80000001, 0x8, 0x7fffffff, 0x6, 0x2, 0x2, 0x5, 0xff, 0xf0000000, 0x0, 0x0, 0x9, 0x4, 0x7, 0x0, 0x2, 0x1ce22000, 0x120, 0x5, 0x9, 0x1, 0x0, 0x9c49, 0x2, 0x9, 0x8a, 0x2, 0x9, 0x80000001, 0x5fa0, 0x0, 0x0, 0x80, 0x1, 0x8, 0xc90a, 0x1000, 0xfd9, 0xffffffe0, 0x8, 0x20, 0x1f, 0x1, 0x5, 0x0, 0xffff, 0x200, 0xad01, 0xf8, 0x4, 0x4, 0x66d, 0x0, 0x7ff, 0x7, 0xffffffff, 0x7, 0x3ff, 0x7fffffff, 0x8, 0x20, 0x2, 0x9, 0x4, 0x1, 0x879, 0x6a8, 0x4, 0x2, 0x5, 0x1, 0xd082, 0xa65, 0x3ff, 0x8000, 0x0, 0xc1, 0x9, 0x200, 0x80000000, 0x0, 0x0, 0x7f, 0x200, 0x7fff, 0x7, 0xa6b5, 0x7, 0x779d, 0x4, 0x200, 0x406a, 0x491a, 0x5, 0x5, 0x4, 0xffffffff, 0x7f, 0x1000, 0xd6, 0xfffff801, 0x6, 0x7, 0x2, 0x5, 0x2, 0x6, 0x6, 0x7fff, 0x4, 0x7fff, 0x1, 0x200, 0x4, 0x7, 0x80000001, 0xffff, 0x3546, 0x6, 0x7ff, 0x1, 0x4, 0x0, 0xfff, 0x8, 0x2, 0x0, 0x1, 0x0, 0x1, 0x91, 0x1000, 0x8000, 0x0, 0xffff, 0xd4, 0x3ff, 0x936, 0x3, 0x5, 0x6, 0x3, 0x7d3, 0x5, 0x40, 0x200, 0x7, 0x5, 0x0, 0x7, 0xffff, 0x8, 0x9, 0x0, 0x5, 0x3, 0x41e, 0xb, 0xffffff01, 0x8, 0x1, 0x9d, 0x3f, 0x1, 0x3, 0x5]}) 07:22:08 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) [ 1014.213298][T30383] EXT4-fs (loop1): bad geometry: block count 558 exceeds size of device (525 blocks) [ 1014.247385][T30385] FAT-fs (loop4): Directory bread(block 6) failed [ 1014.255374][T30388] EXT4-fs (loop5): error: could not find journal device path: error -2 07:22:08 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x0, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:08 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:08 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x0, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:08 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x0, 0x7, 0x0) r1 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB]) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000000)={0x426f0a2f, 0x2}) close(r1) 07:22:08 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) [ 1014.394470][T30383] EXT4-fs (loop1): bad geometry: block count 558 exceeds size of device (525 blocks) [ 1014.498177][T30416] FAT-fs (loop4): Directory bread(block 6) failed 07:22:09 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000100)={r1}) 07:22:09 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab59362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6c33ac7f7e58f57cb6c37e89f0e036126b592ecb1c4e841590662b9aaabd775c5"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x0, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:09 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000060401000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:22:09 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab59362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000003202000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:22:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(r0, &(0x7f0000000000)='./file0\x00', 0x800002, 0x8) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)) 07:22:09 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca00c2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab5d362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6c33ac7f7e58f57cb6c37e89f0e036126b592ecb1c4e841590662b9aaabd775c5"], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:09 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:09 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) [ 1015.124456][T30432] EXT4-fs (loop5): error: could not find journal device path: error -2 [ 1015.134301][T30431] EXT4-fs (loop1): bad geometry: block count 562 exceeds size of device (525 blocks) 07:22:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000004802000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:22:09 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:09 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000100401000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) [ 1015.183583][T30441] FAT-fs (loop4): Directory bread(block 6) failed [ 1015.321752][T30465] EXT4-fs (loop1): bad geometry: block count 584 exceeds size of device (525 blocks) [ 1015.338804][T30463] EXT4-fs (loop5): error: could not find journal device path: error -2 [ 1015.383193][T30465] EXT4-fs (loop1): bad geometry: block count 584 exceeds size of device (525 blocks) 07:22:10 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000100)={r2}) 07:22:10 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:10 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(r0, &(0x7f0000000000)='./file0\x00', 0x74801, 0xb) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)) 07:22:10 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) 07:22:10 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000000501000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:22:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000004c02000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:22:10 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:10 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) 07:22:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000005e02000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:22:10 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab59362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) [ 1016.024006][T30487] EXT4-fs (loop5): error: could not find journal device path: error -2 [ 1016.032790][T30490] EXT4-fs (loop1): bad geometry: block count 588 exceeds size of device (525 blocks) [ 1016.036003][T30484] FAT-fs (loop4): Directory bread(block 6) failed 07:22:10 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) 07:22:10 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000000601000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) [ 1016.245251][T30516] EXT4-fs (loop5): error: could not find journal device path: error -2 [ 1016.296698][T30519] EXT4-fs (loop1): bad geometry: block count 606 exceeds size of device (525 blocks) [ 1016.367714][T30519] EXT4-fs (loop1): bad geometry: block count 606 exceeds size of device (525 blocks) [ 1016.827252][ T22] kauditd_printk_skb: 424 callbacks suppressed [ 1016.827261][ T22] audit: type=1326 audit(1621927331.328:1128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=30483 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7fc00000 [ 1016.858520][ T22] audit: type=1326 audit(1621927331.328:1129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=30483 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=16 compat=0 ip=0x4665d9 code=0x7fc00000 [ 1016.882863][ T22] audit: type=1326 audit(1621927331.328:1130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=30483 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7fc00000 [ 1016.908200][ T22] audit: type=1326 audit(1621927331.328:1131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=30483 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7fc00000 [ 1016.933280][ T22] audit: type=1326 audit(1621927331.328:1132): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=30483 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7fc00000 [ 1016.957654][ T22] audit: type=1326 audit(1621927331.328:1133): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=30483 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7fc00000 [ 1016.983439][ T22] audit: type=1326 audit(1621927331.328:1134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=30483 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7fc00000 [ 1017.007832][ T22] audit: type=1326 audit(1621927331.328:1135): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=30483 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7fc00000 [ 1017.033153][ T22] audit: type=1326 audit(1621927331.328:1136): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=30483 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7fc00000 07:22:11 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000100)={r2}) 07:22:11 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:11 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca00c2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab5d362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6c33ac7f7e58f57cb6c37e89f0e036126b592ecb1c4e841590662b9aaabd775c5"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:11 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x202480, 0x0) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(r0, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x7c, 0x0, 0x216, 0x70bd26, 0x25dfdbfb, {}, [{{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x7}, {0x6, 0x11, 0x120}}, {{@pci={{0x8}, {0x11}}, {0x8}}, {0x8, 0xb, 0x5d93}, {0x6, 0x11, 0x3}}]}, 0x7c}, 0x1, 0x0, 0x0, 0x24000005}, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)) 07:22:11 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000040601000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:22:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000006002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 1017.058345][ T22] audit: type=1326 audit(1621927331.328:1137): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=30483 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7fc00000 07:22:11 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:11 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:11 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) [ 1017.158346][T30533] EXT4-fs (loop1): bad geometry: block count 608 exceeds size of device (525 blocks) [ 1017.174283][T30539] EXT4-fs (loop5): error: could not find journal device path: error -2 [ 1017.185404][T30537] FAT-fs (loop4): Directory bread(block 6) failed 07:22:11 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000000701000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:22:11 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000080)) 07:22:11 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab59362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6c33ac7f7e58f57cb6c37e89f0e036126b592ecb1c4e841590662b9aaabd775c5"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) [ 1017.238338][T30533] EXT4-fs (loop1): bad geometry: block count 608 exceeds size of device (525 blocks) [ 1017.386312][T30559] EXT4-fs (loop5): error: could not find journal device path: error -2 [ 1017.435445][T30564] FAT-fs (loop4): bogus number of reserved sectors [ 1017.454024][T30564] FAT-fs (loop4): Can't find a valid FAT filesystem 07:22:12 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000100)={r2}) 07:22:12 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) 07:22:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000006802000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:22:12 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000000901000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:22:12 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab59362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:12 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x181000, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='@']) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000000)={'nat\x00', 0x0, [0x0, 0x4, 0x3, 0x0, 0xfffffffd]}, &(0x7f0000000240)=0x54) readahead(r1, 0x8, 0x10000) r2 = socket$inet_icmp(0x2, 0x2, 0x1) setsockopt$IPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x41, &(0x7f0000000140)={'security\x00', 0x4, [{}, {}, {}, {}]}, 0x68) 07:22:12 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:12 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) 07:22:12 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000000a01000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) [ 1018.024161][T30577] EXT4-fs (loop1): bad geometry: block count 616 exceeds size of device (525 blocks) [ 1018.034621][T30582] EXT4-fs (loop5): error: could not find journal device path: error -2 07:22:12 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab59362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e38"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:12 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) [ 1018.094243][T30585] FAT-fs (loop4): Unrecognized mount option "@" or missing value 07:22:12 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab59362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e38"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) [ 1018.148199][T30577] EXT4-fs (loop1): bad geometry: block count 616 exceeds size of device (525 blocks) [ 1018.166524][T30597] EXT4-fs (loop5): error: could not find journal device path: error -2 07:22:13 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000100)={r2}) 07:22:13 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab59362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6c33ac7f7e58f57cb6c37e89f0e036126b592ecb1c4e841590662b9aaabd775c5"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) listen(0xffffffffffffffff, 0x0) 07:22:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000006c02000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:22:13 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:13 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000000)={'nat\x00'}, &(0x7f0000000240)=0x54) preadv(r1, &(0x7f0000000040)=[{&(0x7f0000000280)=""/207, 0xcf}, {&(0x7f0000000000)=""/64, 0x40}, {&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/4096, 0x1000}], 0x4, 0xffffffff, 0x7) 07:22:13 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000000b01000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:22:13 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:13 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca00c2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab5d362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6c33ac7f7e58f57cb6c37e89f0e036126b592ecb1c4e841590662b9aaabd775c5"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) listen(0xffffffffffffffff, 0x0) 07:22:13 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000100)={r2}) [ 1018.910225][T30616] EXT4-fs (loop1): bad geometry: block count 620 exceeds size of device (525 blocks) [ 1018.921778][T30621] FAT-fs (loop4): Directory bread(block 6) failed [ 1018.949160][T30620] EXT4-fs (loop5): error: could not find journal device path: error -2 07:22:13 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000000c01000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:22:13 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:13 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r2}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) listen(0xffffffffffffffff, 0x0) 07:22:13 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000100)={r2}) 07:22:13 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="04"]) [ 1019.066368][T30616] EXT4-fs (loop1): bad geometry: block count 620 exceeds size of device (525 blocks) 07:22:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000007402000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:22:13 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000300)={'filter\x00', 0x0, [0x1f, 0x8, 0x6]}, &(0x7f0000000380)=0x44) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@bridge_delneigh={0x28, 0x1c, 0xd03, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x2}, [@NDA_LLADDR={0xa, 0x2, @link_local}]}, 0x28}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xf, 0x8, &(0x7f0000000000)=@raw=[@btf_id={0x18, 0x4, 0x3, 0x0, 0x1}, @exit, @btf_id={0x18, 0xa, 0x3, 0x0, 0x4}, @jmp={0x5, 0x0, 0xc, 0x5, 0x5, 0x0, 0xfffffffffffffff4}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @ldst={0x1, 0x2, 0x2, 0xb, 0x4, 0xfffffffffffffff8, 0xffffffffffffffe7}], &(0x7f0000000040)='GPL\x00', 0xfffff611, 0x0, 0x0, 0x41100, 0x10, '\x00', r2, 0x6, r0, 0x8, &(0x7f0000000140)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000180)={0x3, 0x7, 0x1, 0x56443277}, 0x10, 0xffffffffffffffff, r0}, 0x78) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x20, &(0x7f0000000080)) 07:22:13 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:13 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000100)={r2}) 07:22:13 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) [ 1019.157885][T30648] EXT4-fs (loop5): error: could not find journal device path: error -2 07:22:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000302000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:22:13 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000000d01000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:22:13 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) [ 1019.224495][T30656] FAT-fs (loop4): Unrecognized mount option "" or missing value 07:22:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000302000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:22:13 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="3e1df5457566bb8cfa056a2f664e3b6fb21cff9084aadf16cc7420f68c2b1c80e42a607380f899e978f6c79512bc375a8ffc0568c338bffa0da1ceee7ee39207e5d633b7178e65899cb38f337487932539dcb40d68d932bd72159f8b771a40ab19eb1be8835ee060c9f5c8a179f3f8319a624b2beee9ce6698b58f45576dbaa4fa727df90e27760dddec9a0c942b842ae36a5cfa1653e0d6f8b8714953ffbdda3011cd10446fb693349fc7c332af11f3643f179f68ffc3cf29a2fad276dddbf2184d4a"]) 07:22:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000007a02000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:22:13 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) [ 1019.292459][T30662] EXT4-fs (loop1): bad geometry: block count 628 exceeds size of device (525 blocks) 07:22:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000302000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 1019.375434][T30675] EXT4-fs (loop5): error: could not find journal device path: error -2 [ 1019.394028][T30684] EXT4-fs (loop1): bad geometry: block count 634 exceeds size of device (525 blocks) 07:22:13 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:13 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000003c0)="eb3c908000db013f04f93189ac3bae4612797b8bfdb878cecd3783b29fe17fdafdd3badc9a117904abbc4af117fd8c1a3e7ce3965076dccd3ef1a0ba838bd2d60e20ce940938377e9444ba54bc8c0e00d8a46f55e575d22ed65070834f88104b0d4e43c8e93c6c393762655c8ca7a865cef5aba2bc74a8f61517e4af5ad65d798d1556e52f6c85c7441ecfd9c3627b7367da5fb5ef8b122a64e11d1b26aed963dc12a40bf052a1cbdc06c577b6933a64ab671004242fdc078b82bcfae766a4a06215f3ba903bf6ccc14afc609b05316d3c60a8da9e192a8fd84cdd73072b08285143312b681a0105901c406adc3fc51aba8f1c1d140be25a691e5de77920b2f65484b7e725b31e9c6afa218b87f8d3c4dfa440594613ae10829c856c6e52", 0x11e}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000000)={[], [{@smackfsfloor={'smackfsfloor', 0x3d, 'vfat\x00'}}, {@uid_gt={'uid>', 0xee00}}]}) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x7ff, 0x1, 0xe6, 0x7}, {0x0, 0x81, 0x25, 0xaa}, {0x1f, 0x1f, 0xa3, 0x8}, {0x1, 0x26, 0x5, 0x2}]}) preadv(r1, &(0x7f0000000340)=[{&(0x7f0000000140)=""/122, 0x7a}, {&(0x7f00000001c0)=""/61, 0x3d}, {&(0x7f0000000280)=""/182, 0xb6}], 0x3, 0x2, 0xc7) r2 = openat$incfs(r0, &(0x7f0000000380)='.pending_reads\x00', 0x2602, 0x40) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r3, 0xc0182101, &(0x7f0000000100)={r4}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000140)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r3, 0xc0182101, &(0x7f00000001c0)={r5}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000500)={r5, 0x3, 0x8}) r6 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r6, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r6, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r6, 0x4004af61, &(0x7f0000000540)=0x1) [ 1019.406262][T30687] FAT-fs (loop4): Unrecognized mount option ">Eufj/fN;ot +*`sxǕ7Zh8~3e3t%9ܴh2rw@^`ȡy1bK+fEWmr}'v +*j\SqIS0Do42d?h)vMJ" or missing value [ 1019.544020][T30684] EXT4-fs (loop1): bad geometry: block count 634 exceeds size of device (525 blocks) 07:22:14 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000100)={r2}) 07:22:14 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:14 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000000e01000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:22:14 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x10c142, 0x0) futimesat(r1, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)={{0x77359400}}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)) 07:22:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="20000000cb02000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:22:14 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) [ 1020.114128][T30706] EXT4-fs (loop5): error: could not find journal device path: error -2 [ 1020.141227][T30708] FAT-fs (loop4): Directory bread(block 6) failed [ 1020.143406][T30710] EXT4-fs (loop1): bad geometry: block count 715 exceeds size of device (525 blocks) 07:22:14 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000041001000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:22:14 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:14 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000000)={'nat\x00'}, &(0x7f0000000240)=0x54) r2 = accept4$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000040)=0x1c, 0x100800) sendfile(r1, r2, 0x0, 0xfffffffffffffffb) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="4dcb7900fd2d744072be13ba6733489e6ff1a7a967a710cf8f851b56516e115adb09afe1cc9ed52de17641ae980a71e4fbebf7e3d1554712228ac7a676c3b12e0f1245a938bf18303d559057123945f5701650cbfb0931ab4fc8f840ebe1fd34afff466e9f74dfcdaee7d6d6599570f5f04840ce7e684b62b4e426b56e3fa97f1f68ed0222c2b3b5ae937e5c2fb282acc264356076de9c2acc4d214a1d756c16d9539857a70505a1ad6cab792dac2aa2de0fdceba1caf780856396b94d1cd9c90b624a565055009d93081a280b17ac38a1299b34de5f769505c147a5d6aac798a113a92c1205285a9d7adbcbe485f1aed12f0fb1df64c2fcf86c0870820e54f9f36d"]) 07:22:14 executing program 2: ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab59362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6c33ac7f7e58f57cb6c37e89f0e036126b592ecb1c4e841590662b9aaabd775c5"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) 07:22:14 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab59362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6"], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:14 executing program 2: ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) [ 1020.342412][T30710] EXT4-fs (loop1): bad geometry: block count 715 exceeds size of device (525 blocks) [ 1020.353928][T30724] EXT4-fs (loop5): error: could not find journal device path: error -2 [ 1020.376291][T30729] FAT-fs (loop4): Unrecognized mount option "My" or missing value 07:22:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000100)={r2}) 07:22:15 executing program 2: ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00', r1}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) 07:22:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="20000000e002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:22:15 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:15 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) unlink(&(0x7f0000000000)='./file0\x00') mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)) 07:22:15 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000201001000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:22:15 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:15 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) r2 = socket$inet_udp(0x2, 0x2, 0x0) fgetxattr(r0, &(0x7f0000000040)=@known='system.posix_acl_default\x00', &(0x7f0000000100)=""/74, 0x4a) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r0, 0xf505, 0x0) bind$inet(r2, &(0x7f0000000000)={0xa, 0x0, @multicast2}, 0x10) 07:22:15 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000001101000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:22:15 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x20010, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000000)={[{@fat=@codepage={'codepage', 0x3d, '864'}}, {@shortname_winnt}]}) [ 1021.010817][T30749] EXT4-fs (loop5): error: could not find journal device path: error -2 [ 1021.019277][T30748] FAT-fs (loop4): Directory bread(block 6) failed [ 1021.026206][T30751] EXT4-fs (loop1): bad geometry: block count 736 exceeds size of device (525 blocks) 07:22:15 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:15 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) r2 = socket$inet_udp(0x2, 0x2, 0x0) fgetxattr(r0, &(0x7f0000000040)=@known='system.posix_acl_default\x00', &(0x7f0000000100)=""/74, 0x4a) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r0, 0xf505, 0x0) bind$inet(r2, &(0x7f0000000000)={0xa, 0x0, @multicast2}, 0x10) [ 1021.155915][T30751] EXT4-fs (loop1): bad geometry: block count 736 exceeds size of device (525 blocks) [ 1021.174519][T30767] EXT4-fs (loop5): error: could not find journal device path: error -2 [ 1021.366036][T30776] FAT-fs (loop4): Directory bread(block 6) failed 07:22:16 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000100)={r2}) 07:22:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000003000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:22:16 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) r2 = socket$inet_udp(0x2, 0x2, 0x0) fgetxattr(r0, &(0x7f0000000040)=@known='system.posix_acl_default\x00', &(0x7f0000000100)=""/74, 0x4a) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r0, 0xf505, 0x0) bind$inet(r2, &(0x7f0000000000)={0xa, 0x0, @multicast2}, 0x10) 07:22:16 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab59362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6"], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:16 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000001201000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:22:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) readlinkat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)=""/185, 0xb9) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)) 07:22:16 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:16 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x204000000000000, &(0x7f0000000080)) 07:22:16 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000001801000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:22:16 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) [ 1021.878319][T30791] EXT4-fs (loop5): error: could not find journal device path: error -2 [ 1021.898610][T30794] FAT-fs (loop4): Directory bread(block 6) failed [ 1021.899816][T30792] EXT4-fs (loop1): bad geometry: block count 768 exceeds size of device (525 blocks) 07:22:16 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x50, r1, 0x400, 0x70bd2d, 0x25dfdbfd, {{}, {@val={0x8}, @val={0xc, 0x99, {0xdf8, 0xf}}}}, [@NL80211_ATTR_KEY={0x28, 0x50, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPES={0x10, 0x8, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}]}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "87a0968f9c5ce7041ebcf92780"}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x20000080}, 0x14) setsockopt(r4, 0x9, 0x8, &(0x7f0000000100)="eb26c9b382db0f14007840074f640ce613377a37a30fcba463f098f246d1c6da4e71385448c35618aa4302f339990dcd7ef03b0bf2d58239c044df805f28be0abcbecd57be803ed733aaa7a5467d017b1a4d5a9f49889824e50452e3935762d5a9e80c5fb00941d5ecb7b8fcdad455808c95ff348b624a43eb31420b2e7641cd172899c52f3080caea35e1507d50ce1363ba951584be3b70a3defe1612135fef9035ec63c91703c93284e28f0fb889b6eccf13a6f9fa6fbeacddf55c7db2fbec1efaa8b46dab3b3c93277208b75c0508865cbfe9bf601e7f0cf7074012cc771a7c3d9186e9061f1013fb11", 0xeb) getsockopt$IPT_SO_GET_INFO(r3, 0x0, 0x40, &(0x7f0000000000)={'nat\x00'}, &(0x7f0000000240)=0x54) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000080)={0xd3be, 0x2, 0xfffffffffffffffa, 0x6, 0x20, 0x8}) bind$inet(r2, &(0x7f0000000000)={0xa, 0x0, @loopback}, 0x10) 07:22:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='\x00']) [ 1022.023810][T30792] EXT4-fs (loop1): bad geometry: block count 768 exceeds size of device (525 blocks) [ 1022.115519][T30817] EXT4-fs (loop5): error: could not find journal device path: error -2 [ 1022.140856][T30821] FAT-fs (loop4): Directory bread(block 6) failed 07:22:17 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000100)={r2}) 07:22:17 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:17 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x50, r1, 0x400, 0x70bd2d, 0x25dfdbfd, {{}, {@val={0x8}, @val={0xc, 0x99, {0xdf8, 0xf}}}}, [@NL80211_ATTR_KEY={0x28, 0x50, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPES={0x10, 0x8, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}]}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "87a0968f9c5ce7041ebcf92780"}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x20000080}, 0x14) setsockopt(r4, 0x9, 0x8, &(0x7f0000000100)="eb26c9b382db0f14007840074f640ce613377a37a30fcba463f098f246d1c6da4e71385448c35618aa4302f339990dcd7ef03b0bf2d58239c044df805f28be0abcbecd57be803ed733aaa7a5467d017b1a4d5a9f49889824e50452e3935762d5a9e80c5fb00941d5ecb7b8fcdad455808c95ff348b624a43eb31420b2e7641cd172899c52f3080caea35e1507d50ce1363ba951584be3b70a3defe1612135fef9035ec63c91703c93284e28f0fb889b6eccf13a6f9fa6fbeacddf55c7db2fbec1efaa8b46dab3b3c93277208b75c0508865cbfe9bf601e7f0cf7074012cc771a7c3d9186e9061f1013fb11", 0xeb) getsockopt$IPT_SO_GET_INFO(r3, 0x0, 0x40, &(0x7f0000000000)={'nat\x00'}, &(0x7f0000000240)=0x54) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000080)={0xd3be, 0x2, 0xfffffffffffffffa, 0x6, 0x20, 0x8}) bind$inet(r2, &(0x7f0000000000)={0xa, 0x0, @loopback}, 0x10) 07:22:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000005000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:22:17 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000001f01000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:22:17 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000000)={'nat\x00'}, &(0x7f0000000240)=0x54) r2 = open(&(0x7f0000000040)='./file1\x00', 0x110200, 0x46) splice(r1, &(0x7f0000000000)=0x1ff, r2, &(0x7f0000000140)=0x8, 0x6, 0xd) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)) [ 1022.701556][ T22] kauditd_printk_skb: 67 callbacks suppressed [ 1022.701563][ T22] audit: type=1326 audit(1621927337.199:1205): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=30788 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7fc00000 07:22:17 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x50, r1, 0x400, 0x70bd2d, 0x25dfdbfd, {{}, {@val={0x8}, @val={0xc, 0x99, {0xdf8, 0xf}}}}, [@NL80211_ATTR_KEY={0x28, 0x50, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPES={0x10, 0x8, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}]}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "87a0968f9c5ce7041ebcf92780"}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x20000080}, 0x14) setsockopt(r4, 0x9, 0x8, &(0x7f0000000100)="eb26c9b382db0f14007840074f640ce613377a37a30fcba463f098f246d1c6da4e71385448c35618aa4302f339990dcd7ef03b0bf2d58239c044df805f28be0abcbecd57be803ed733aaa7a5467d017b1a4d5a9f49889824e50452e3935762d5a9e80c5fb00941d5ecb7b8fcdad455808c95ff348b624a43eb31420b2e7641cd172899c52f3080caea35e1507d50ce1363ba951584be3b70a3defe1612135fef9035ec63c91703c93284e28f0fb889b6eccf13a6f9fa6fbeacddf55c7db2fbec1efaa8b46dab3b3c93277208b75c0508865cbfe9bf601e7f0cf7074012cc771a7c3d9186e9061f1013fb11", 0xeb) getsockopt$IPT_SO_GET_INFO(r3, 0x0, 0x40, &(0x7f0000000000)={'nat\x00'}, &(0x7f0000000240)=0x54) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000080)={0xd3be, 0x2, 0xfffffffffffffffa, 0x6, 0x20, 0x8}) bind$inet(r2, &(0x7f0000000000)={0xa, 0x0, @loopback}, 0x10) 07:22:17 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:17 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) r2 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000000)={'nat\x00'}, &(0x7f0000000240)=0x54) r3 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r3, 0x0, 0x40, &(0x7f0000000000)={'nat\x00'}, &(0x7f0000000240)=0x54) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000000)=[r2, r3], 0x2) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)) 07:22:17 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) [ 1022.774936][T30831] FAT-fs (loop4): Directory bread(block 6) failed [ 1022.786908][T30834] EXT4-fs (loop5): error: could not find journal device path: error -2 [ 1022.805869][T30838] EXT4-fs (loop1): bad geometry: block count 1280 exceeds size of device (525 blocks) 07:22:17 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x50, r1, 0x400, 0x70bd2d, 0x25dfdbfd, {{}, {@val={0x8}, @val={0xc, 0x99, {0xdf8, 0xf}}}}, [@NL80211_ATTR_KEY={0x28, 0x50, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPES={0x10, 0x8, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}]}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "87a0968f9c5ce7041ebcf92780"}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x20000080}, 0x14) setsockopt(r3, 0x9, 0x8, &(0x7f0000000100)="eb26c9b382db0f14007840074f640ce613377a37a30fcba463f098f246d1c6da4e71385448c35618aa4302f339990dcd7ef03b0bf2d58239c044df805f28be0abcbecd57be803ed733aaa7a5467d017b1a4d5a9f49889824e50452e3935762d5a9e80c5fb00941d5ecb7b8fcdad455808c95ff348b624a43eb31420b2e7641cd172899c52f3080caea35e1507d50ce1363ba951584be3b70a3defe1612135fef9035ec63c91703c93284e28f0fb889b6eccf13a6f9fa6fbeacddf55c7db2fbec1efaa8b46dab3b3c93277208b75c0508865cbfe9bf601e7f0cf7074012cc771a7c3d9186e9061f1013fb11", 0xeb) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000000)={'nat\x00'}, &(0x7f0000000240)=0x54) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000080)={0xd3be, 0x2, 0xfffffffffffffffa, 0x6, 0x20, 0x8}) 07:22:17 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000002001000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) [ 1022.976279][T30838] EXT4-fs (loop1): bad geometry: block count 1280 exceeds size of device (525 blocks) [ 1023.062265][T30860] FAT-fs (loop4): Directory bread(block 6) failed [ 1023.073568][T30859] EXT4-fs (loop5): error: could not find journal device path: error -2 07:22:18 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000100)={r2}) 07:22:18 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x50, r1, 0x400, 0x70bd2d, 0x25dfdbfd, {{}, {@val={0x8}, @val={0xc, 0x99, {0xdf8, 0xf}}}}, [@NL80211_ATTR_KEY={0x28, 0x50, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPES={0x10, 0x8, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}]}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "87a0968f9c5ce7041ebcf92780"}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x20000080}, 0x14) setsockopt(r3, 0x9, 0x8, &(0x7f0000000100)="eb26c9b382db0f14007840074f640ce613377a37a30fcba463f098f246d1c6da4e71385448c35618aa4302f339990dcd7ef03b0bf2d58239c044df805f28be0abcbecd57be803ed733aaa7a5467d017b1a4d5a9f49889824e50452e3935762d5a9e80c5fb00941d5ecb7b8fcdad455808c95ff348b624a43eb31420b2e7641cd172899c52f3080caea35e1507d50ce1363ba951584be3b70a3defe1612135fef9035ec63c91703c93284e28f0fb889b6eccf13a6f9fa6fbeacddf55c7db2fbec1efaa8b46dab3b3c93277208b75c0508865cbfe9bf601e7f0cf7074012cc771a7c3d9186e9061f1013fb11", 0xeb) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000000)={'nat\x00'}, &(0x7f0000000240)=0x54) 07:22:18 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000007000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:22:18 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000280)=""/142, 0x8e}], 0x1, 0x9, 0x9) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write$P9_RCLUNK(r0, &(0x7f0000000040)={0x7, 0x79, 0x1}, 0x7) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="009614690bfa9b89e6ae4626ed0ef01d1120d59d6646545b8f820a2cf7de2b9141f7f86d0b00eeadbf1b1c8de49406fe41160f276fcfd81ac867c0b218266ff38ae6a33aa05e1ed97d485615ddd963aa3895aff903ab94e383b7540a0d793f49e4"]) 07:22:18 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000102001000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) [ 1023.594734][ T22] audit: type=1326 audit(1621927338.099:1206): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=30832 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7fc00000 07:22:18 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x50, r1, 0x400, 0x70bd2d, 0x25dfdbfd, {{}, {@val={0x8}, @val={0xc, 0x99, {0xdf8, 0xf}}}}, [@NL80211_ATTR_KEY={0x28, 0x50, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPES={0x10, 0x8, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}]}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "87a0968f9c5ce7041ebcf92780"}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x20000080}, 0x14) setsockopt(r2, 0x9, 0x8, &(0x7f0000000100)="eb26c9b382db0f14007840074f640ce613377a37a30fcba463f098f246d1c6da4e71385448c35618aa4302f339990dcd7ef03b0bf2d58239c044df805f28be0abcbecd57be803ed733aaa7a5467d017b1a4d5a9f49889824e50452e3935762d5a9e80c5fb00941d5ecb7b8fcdad455808c95ff348b624a43eb31420b2e7641cd172899c52f3080caea35e1507d50ce1363ba951584be3b70a3defe1612135fef9035ec63c91703c93284e28f0fb889b6eccf13a6f9fa6fbeacddf55c7db2fbec1efaa8b46dab3b3c93277208b75c0508865cbfe9bf601e7f0cf7074012cc771a7c3d9186e9061f1013fb11", 0xeb) [ 1023.640260][ T22] audit: type=1326 audit(1621927338.099:1207): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=30832 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=16 compat=0 ip=0x4665d9 code=0x7fc00000 [ 1023.658044][T30871] FAT-fs (loop4): Directory bread(block 6) failed [ 1023.673475][T30872] EXT4-fs (loop5): error: could not find journal device path: error -2 07:22:18 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000002201000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:22:18 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:18 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000000)={'nat\x00'}, &(0x7f0000000240)=0x54) recvmsg(r1, &(0x7f0000001680)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000280)=""/138, 0x8a}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/214, 0xd6}, {&(0x7f0000001440)=""/160, 0xa0}, {&(0x7f0000001500)=""/221, 0xdd}, {&(0x7f0000000000)=""/83, 0x53}], 0x6, &(0x7f0000001600)=""/126, 0x7e}, 0x10040) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000000)={'nat\x00'}, &(0x7f0000000240)=0x54) mmap(&(0x7f0000696000/0x2000)=nil, 0x2000, 0x8, 0x810, r2, 0x53873000) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)) recvmmsg(r1, &(0x7f0000001f40)=[{{&(0x7f00000016c0)=@l2tp={0x2, 0x0, @loopback}, 0x80, &(0x7f0000001a00)=[{&(0x7f0000001740)=""/154, 0x9a}, {&(0x7f0000001800)=""/137, 0x89}, {&(0x7f00000018c0)=""/13, 0xd}, {&(0x7f0000001bc0)=""/230, 0xe6}], 0x4, &(0x7f0000001a40)=""/235, 0xeb}, 0x7}, {{&(0x7f0000001b40)=@isdn, 0x80, &(0x7f0000001e00), 0x0, &(0x7f0000001e40)=""/241, 0xf1}, 0x1}], 0x2, 0x40000000, &(0x7f0000001fc0)={0x77359400}) 07:22:18 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt(r1, 0x9, 0x8, &(0x7f0000000100)="eb26c9b382db0f14007840074f640ce613377a37a30fcba463f098f246d1c6da4e71385448c35618aa4302f339990dcd7ef03b0bf2d58239c044df805f28be0abcbecd57be803ed733aaa7a5467d017b1a4d5a9f49889824e50452e3935762d5a9e80c5fb00941d5ecb7b8fcdad455808c95ff348b624a43eb31420b2e7641cd172899c52f3080caea35e1507d50ce1363ba951584be3b70a3defe1612135fef9035ec63c91703c93284e28f0fb889b6eccf13a6f9fa6fbeacddf55c7db2fbec1efaa8b46dab3b3c93277208b75c0508865cbfe9bf601e7f0cf7074012cc771a7c3d9186e9061f1013fb11", 0xeb) 07:22:18 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) setsockopt(0xffffffffffffffff, 0x9, 0x8, &(0x7f0000000100)="eb26c9b382db0f14007840074f640ce613377a37a30fcba463f098f246d1c6da4e71385448c35618aa4302f339990dcd7ef03b0bf2d58239c044df805f28be0abcbecd57be803ed733aaa7a5467d017b1a4d5a9f49889824e50452e3935762d5a9e80c5fb00941d5ecb7b8fcdad455808c95ff348b624a43eb31420b2e7641cd172899c52f3080caea35e1507d50ce1363ba951584be3b70a3defe1612135fef9035ec63c91703c93284e28f0fb889b6eccf13a6f9fa6fbeacddf55c7db2fbec1efaa8b46dab3b3c93277208b75c0508865cbfe9bf601e7f0cf7074012cc771a7c3d9186e9061f1013fb11", 0xeb) [ 1023.827443][T30880] EXT4-fs (loop1): bad geometry: block count 1792 exceeds size of device (525 blocks) [ 1023.864378][T30897] EXT4-fs (loop5): error: could not find journal device path: error -2 [ 1023.918984][T30896] FAT-fs (loop4): Directory bread(block 6) failed 07:22:19 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000100)={r2}) 07:22:19 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec86177e73258516a6eb2ff0757f0779c66c54c33a580711ad4a4fd32bd1597adac86b1e6bf28dfc5ff0cc31dc3ae6740d0249c5a1781f077b0e8c7660ce4261677251534efa4a4b773f49a9b28db1361824e7c34eae785fc8e859ec9d2169bb0c76110bd1fd7751ea2ee7e7e808611106dd231dab89e6dd1f64ec90e4bbf1daad98f51f6d473c59ec92aef09f6d231cfe276d2c82bfc7fd72f3ee1e852507d77e9c1103ae3d5501f635ab59362f6a1ab04a313382815578ee5b7c2812a590877551aaa256f2271648b85349ce55ac4c0e26342efa8af5a0ca8c0633900b43cd55bbcae5783799cde058809b2bcb4120738d421e68fceadfd533b0ab09898e44b3216ececa8862ea43d74bd05a4a8dea7f28cff345fc48918dca8a3bb91dd28b3b15d8fc9ad4c68e385f547649fdde97f6"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 07:22:19 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) setsockopt(0xffffffffffffffff, 0x9, 0x8, &(0x7f0000000100)="eb26c9b382db0f14007840074f640ce613377a37a30fcba463f098f246d1c6da4e71385448c35618aa4302f339990dcd7ef03b0bf2d58239c044df805f28be0abcbecd57be803ed733aaa7a5467d017b1a4d5a9f49889824e50452e3935762d5a9e80c5fb00941d5ecb7b8fcdad455808c95ff348b624a43eb31420b2e7641cd172899c52f3080caea35e1507d50ce1363ba951584be3b70a3defe1612135fef9035ec63c91703c93284e28f0fb889b6eccf13a6f9fa6fbeacddf55c7db2fbec1efaa8b46dab3b3c93277208b75c0508865cbfe9bf601e7f0cf7074012cc771a7c3d9186e9061f1013fb11", 0xeb) 07:22:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="20000000000a000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:22:19 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000002501000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) [ 1024.535127][ T22] audit: type=1326 audit(1621927339.039:1208): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=30878 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7fc00000 [ 1024.560277][ T22] audit: type=1326 audit(1621927339.039:1209): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=30878 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=16 compat=0 ip=0x4665d9 code=0x7fc00000 07:22:19 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) setsockopt(0xffffffffffffffff, 0x9, 0x8, &(0x7f0000000100)="eb26c9b382db0f14007840074f640ce613377a37a30fcba463f098f246d1c6da4e71385448c35618aa4302f339990dcd7ef03b0bf2d58239c044df805f28be0abcbecd57be803ed733aaa7a5467d017b1a4d5a9f49889824e50452e3935762d5a9e80c5fb00941d5ecb7b8fcdad455808c95ff348b624a43eb31420b2e7641cd172899c52f3080caea35e1507d50ce1363ba951584be3b70a3defe1612135fef9035ec63c91703c93284e28f0fb889b6eccf13a6f9fa6fbeacddf55c7db2fbec1efaa8b46dab3b3c93277208b75c0508865cbfe9bf601e7f0cf7074012cc771a7c3d9186e9061f1013fb11", 0xeb) 07:22:19 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) listen(0xffffffffffffffff, 0x0) 07:22:19 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) listen(0xffffffffffffffff, 0x0) 07:22:19 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt(r1, 0x9, 0x8, &(0x7f0000000100)="eb26c9b382db0f14007840074f640ce613377a37a30fcba463f098f246d1c6da4e71385448c35618aa4302f339990dcd7ef03b0bf2d58239c044df805f28be0abcbecd57be803ed733aaa7a5467d017b1a4d5a9f49889824e50452e3935762d5a9e80c5fb00941d5ecb7b8fcdad455808c95ff348b624a43eb31420b2e7641cd172899c52f3080caea35e1507d50ce1363ba951584be3b70a3defe1612135fef9035ec63c91703c93284e28f0fb889b6eccf13a6f9fa6fbeacddf55c7db2fbec1efaa8b46dab3b3c93277208b75c0508865cbfe9bf601e7f0cf7074012cc771a7c3d9186e9061f1013fb11", 0xeb) [ 1024.633687][T30915] EXT4-fs (loop5): error: could not find journal device path: error -2 [ 1024.642363][T30911] EXT4-fs (loop1): bad geometry: block count 2560 exceeds size of device (525 blocks) 07:22:19 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4, 0x12, r0, 0x2000) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)) 07:22:19 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000ae2601000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:22:19 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt(r1, 0x9, 0x8, &(0x7f0000000100)="eb26c9b382db0f14007840074f640ce613377a37a30fcba463f098f246d1c6da4e71385448c35618aa4302f339990dcd7ef03b0bf2d58239c044df805f28be0abcbecd57be803ed733aaa7a5467d017b1a4d5a9f49889824e50452e3935762d5a9e80c5fb00941d5ecb7b8fcdad455808c95ff348b624a43eb31420b2e7641cd172899c52f3080caea35e1507d50ce1363ba951584be3b70a3defe1612135fef9035ec63c91703c93284e28f0fb889b6eccf13a6f9fa6fbeacddf55c7db2fbec1efaa8b46dab3b3c93277208b75c0508865cbfe9bf601e7f0cf7074012cc771a7c3d9186e9061f1013fb11", 0xeb) [ 1024.744437][T30911] EXT4-fs (loop1): bad geometry: block count 2560 exceeds size of device (525 blocks) [ 1024.803333][T30937] EXT4-fs (loop5): error: could not find journal device path: error -2 07:22:19 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000100)={r2}) 07:22:19 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, 0xfffffffffffffffe) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='inet_sock_set_state\x00'}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) listen(0xffffffffffffffff, 0x0) 07:22:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="20000000020d000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:22:19 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt(r1, 0x9, 0x8, &(0x7f0000000100)="eb26c9b382db0f14007840074f640ce613377a37a30fcba463f098f246d1c6da4e71385448c35618aa4302f339990dcd7ef03b0bf2d58239c044df805f28be0abcbecd57be803ed733aaa7a5467d017b1a4d5a9f49889824e50452e3935762d5a9e80c5fb00941d5ecb7b8fcdad455808c95ff348b624a43eb31420b2e7641cd172899c52f3080caea35e1507d50ce1363ba951584be3b70a3defe1612135fef9035ec63c91703c93284e28f0fb889b6eccf13a6f9fa6fbeacddf55c7db2fbec1efaa8b46dab3b3c93277208b75c0508865cbfe9bf601e7f0cf7074012cc771a7c3d9186e9061f1013fb11", 0xeb) 07:22:19 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x2000, 0x100) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x3, 0x1, 0x7) dup2(0xffffffffffffffff, r2) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000000)={'nat\x00'}, &(0x7f0000000240)=0x54) mmap(&(0x7f000038c000/0x3000)=nil, 0x3000, 0x2000008, 0x12, r1, 0x9b70000) chdir(&(0x7f0000000000)='./file0\x00') 07:22:19 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000002e01000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) [ 1025.443678][ T22] audit: type=1326 audit(1621927339.949:1210): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=30910 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7fc00000 07:22:20 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000200)) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt(r0, 0x9, 0x8, &(0x7f0000000100)="eb26c9b382db0f14007840074f640ce613377a37a30fcba463f098f246d1c6da4e71385448c35618aa4302f339990dcd7ef03b0bf2d58239c044df805f28be0abcbecd57be803ed733aaa7a5467d017b1a4d5a9f49889824e50452e3935762d5a9e80c5fb00941d5ecb7b8fcdad455808c95ff348b624a43eb31420b2e7641cd172899c52f3080caea35e1507d50ce1363ba951584be3b70a3defe1612135fef9035ec63c91703c93284e28f0fb889b6eccf13a6f9fa6fbeacddf55c7db2fbec1efaa8b46dab3b3c93277208b75c0508865cbfe9bf601e7f0cf7074012cc771a7c3d9186e9061f1013fb11", 0xeb) 07:22:20 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000000)={0xa, 0x0, @loopback}, 0x18) [ 1025.523074][T30955] FAT-fs (loop4): Directory bread(block 6) failed [ 1025.543909][T30954] EXT4-fs (loop1): bad geometry: block count 3330 exceeds size of device (525 blocks) [ 1025.543949][T30956] EXT4-fs (loop5): error: could not find journal device path: error -2 07:22:20 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000200)) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt(r0, 0x9, 0x8, &(0x7f0000000100)="eb26c9b382db0f14007840074f640ce613377a37a30fcba463f098f246d1c6da4e71385448c35618aa4302f339990dcd7ef03b0bf2d58239c044df805f28be0abcbecd57be803ed733aaa7a5467d017b1a4d5a9f49889824e50452e3935762d5a9e80c5fb00941d5ecb7b8fcdad455808c95ff348b624a43eb31420b2e7641cd172899c52f3080caea35e1507d50ce1363ba951584be3b70a3defe1612135fef9035ec63c91703c93284e28f0fb889b6eccf13a6f9fa6fbeacddf55c7db2fbec1efaa8b46dab3b3c93277208b75c0508865cbfe9bf601e7f0cf7074012cc771a7c3d9186e9061f1013fb11", 0xeb) 07:22:20 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000000)={0xa, 0x0, @loopback}, 0x18) [ 1025.571059][T30967] FAT-fs (loop4): Directory bread(block 6) failed 07:22:20 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x24c14000) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) statx(r0, &(0x7f0000000000)='./file0\x00', 0x100, 0x4, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x20000, &(0x7f0000000400)={[{@shortname_lower}], [{@hash}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@permit_directio}, {@dont_appraise}, {@fowner_lt}, {@obj_user={'obj_user', 0x3d, '\'-[^)]$#'}}, {@fowner_gt={'fowner>', r1}}, {@euid_gt={'euid>', r1}}, {@smackfshat={'smackfshat', 0x3d, 'permit_directio'}}]}) 07:22:20 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000200)) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt(r0, 0x9, 0x8, &(0x7f0000000100)="eb26c9b382db0f14007840074f640ce613377a37a30fcba463f098f246d1c6da4e71385448c35618aa4302f339990dcd7ef03b0bf2d58239c044df805f28be0abcbecd57be803ed733aaa7a5467d017b1a4d5a9f49889824e50452e3935762d5a9e80c5fb00941d5ecb7b8fcdad455808c95ff348b624a43eb31420b2e7641cd172899c52f3080caea35e1507d50ce1363ba951584be3b70a3defe1612135fef9035ec63c91703c93284e28f0fb889b6eccf13a6f9fa6fbeacddf55c7db2fbec1efaa8b46dab3b3c93277208b75c0508865cbfe9bf601e7f0cf7074012cc771a7c3d9186e9061f1013fb11", 0xeb) [ 1025.657224][T30954] EXT4-fs (loop1): bad geometry: block count 3330 exceeds size of device (525 blocks) 07:22:20 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000100)={r2}) 07:22:20 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000000)={0xa, 0x0, @loopback}, 0x18) 07:22:20 executing program 2: ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt(r0, 0x9, 0x8, &(0x7f0000000100)="eb26c9b382db0f14007840074f640ce613377a37a30fcba463f098f246d1c6da4e71385448c35618aa4302f339990dcd7ef03b0bf2d58239c044df805f28be0abcbecd57be803ed733aaa7a5467d017b1a4d5a9f49889824e50452e3935762d5a9e80c5fb00941d5ecb7b8fcdad455808c95ff348b624a43eb31420b2e7641cd172899c52f3080caea35e1507d50ce1363ba951584be3b70a3defe1612135fef9035ec63c91703c93284e28f0fb889b6eccf13a6f9fa6fbeacddf55c7db2fbec1efaa8b46dab3b3c93277208b75c0508865cbfe9bf601e7f0cf7074012cc771a7c3d9186e9061f1013fb11", 0xeb) 07:22:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="20000000010e000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:22:20 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000003f01000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:22:20 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="7818ac968389476471c91dd3c62799e10c15bbecfbe44a2743d50f3bd75b12d5efd98afeb98b120fa2c4a7c75052ad616e119088897fa4c9dcbc41a60db97c1d75506fdfe35a1892c85801960e9d6ec2"]) [ 1026.343200][ T22] audit: type=1326 audit(1621927340.840:1211): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=30953 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7fc00000 07:22:20 executing program 2: ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt(r0, 0x9, 0x8, &(0x7f0000000100)="eb26c9b382db0f14007840074f640ce613377a37a30fcba463f098f246d1c6da4e71385448c35618aa4302f339990dcd7ef03b0bf2d58239c044df805f28be0abcbecd57be803ed733aaa7a5467d017b1a4d5a9f49889824e50452e3935762d5a9e80c5fb00941d5ecb7b8fcdad455808c95ff348b624a43eb31420b2e7641cd172899c52f3080caea35e1507d50ce1363ba951584be3b70a3defe1612135fef9035ec63c91703c93284e28f0fb889b6eccf13a6f9fa6fbeacddf55c7db2fbec1efaa8b46dab3b3c93277208b75c0508865cbfe9bf601e7f0cf7074012cc771a7c3d9186e9061f1013fb11", 0xeb) 07:22:20 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, @loopback}, 0x18) [ 1026.399514][ T22] audit: type=1326 audit(1621927340.840:1212): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=30953 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=16 compat=0 ip=0x4665d9 code=0x7fc00000 07:22:21 executing program 2: ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt(r0, 0x9, 0x8, &(0x7f0000000100)="eb26c9b382db0f14007840074f640ce613377a37a30fcba463f098f246d1c6da4e71385448c35618aa4302f339990dcd7ef03b0bf2d58239c044df805f28be0abcbecd57be803ed733aaa7a5467d017b1a4d5a9f49889824e50452e3935762d5a9e80c5fb00941d5ecb7b8fcdad455808c95ff348b624a43eb31420b2e7641cd172899c52f3080caea35e1507d50ce1363ba951584be3b70a3defe1612135fef9035ec63c91703c93284e28f0fb889b6eccf13a6f9fa6fbeacddf55c7db2fbec1efaa8b46dab3b3c93277208b75c0508865cbfe9bf601e7f0cf7074012cc771a7c3d9186e9061f1013fb11", 0xeb) 07:22:21 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, @loopback}, 0x18) [ 1026.450556][T30995] EXT4-fs (loop1): bad geometry: block count 3585 exceeds size of device (525 blocks) [ 1026.460804][T30990] EXT4-fs (loop5): error: could not find journal device path: error -2 [ 1026.476498][T30996] FAT-fs (loop4): Unrecognized mount option "xGdq' J'C;[يħPRanܼA|uPoZXn" or missing value 07:22:21 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt(r1, 0x9, 0x8, &(0x7f0000000100)="eb26c9b382db0f14007840074f640ce613377a37a30fcba463f098f246d1c6da4e71385448c35618aa4302f339990dcd7ef03b0bf2d58239c044df805f28be0abcbecd57be803ed733aaa7a5467d017b1a4d5a9f49889824e50452e3935762d5a9e80c5fb00941d5ecb7b8fcdad455808c95ff348b624a43eb31420b2e7641cd172899c52f3080caea35e1507d50ce1363ba951584be3b70a3defe1612135fef9035ec63c91703c93284e28f0fb889b6eccf13a6f9fa6fbeacddf55c7db2fbec1efaa8b46dab3b3c93277208b75c0508865cbfe9bf601e7f0cf7074012cc771a7c3d9186e9061f1013fb11", 0xeb) 07:22:21 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt(r1, 0x9, 0x8, &(0x7f0000000100)="eb26c9b382db0f14007840074f640ce613377a37a30fcba463f098f246d1c6da4e71385448c35618aa4302f339990dcd7ef03b0bf2d58239c044df805f28be0abcbecd57be803ed733aaa7a5467d017b1a4d5a9f49889824e50452e3935762d5a9e80c5fb00941d5ecb7b8fcdad455808c95ff348b624a43eb31420b2e7641cd172899c52f3080caea35e1507d50ce1363ba951584be3b70a3defe1612135fef9035ec63c91703c93284e28f0fb889b6eccf13a6f9fa6fbeacddf55c7db2fbec1efaa8b46dab3b3c93277208b75c0508865cbfe9bf601e7f0cf7074012cc771a7c3d9186e9061f1013fb11", 0xeb) [ 1026.613969][T30995] EXT4-fs (loop1): bad geometry: block count 3585 exceeds size of device (525 blocks) 07:22:21 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000100)={r2}) 07:22:21 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt(r1, 0x9, 0x8, &(0x7f0000000100)="eb26c9b382db0f14007840074f640ce613377a37a30fcba463f098f246d1c6da4e71385448c35618aa4302f339990dcd7ef03b0bf2d58239c044df805f28be0abcbecd57be803ed733aaa7a5467d017b1a4d5a9f49889824e50452e3935762d5a9e80c5fb00941d5ecb7b8fcdad455808c95ff348b624a43eb31420b2e7641cd172899c52f3080caea35e1507d50ce1363ba951584be3b70a3defe1612135fef9035ec63c91703c93284e28f0fb889b6eccf13a6f9fa6fbeacddf55c7db2fbec1efaa8b46dab3b3c93277208b75c0508865cbfe9bf601e7f0cf7074012cc771a7c3d9186e9061f1013fb11", 0xeb) 07:22:21 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000004001000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:22:21 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x680, 0xc2) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)) 07:22:21 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, @loopback}, 0x18) 07:22:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000014000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 1027.259847][ T22] audit: type=1326 audit(1621927341.760:1213): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=30991 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7fc00000 07:22:21 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000000)={0xa, 0x0, @loopback}, 0x18) 07:22:21 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt(r0, 0x9, 0x8, &(0x7f0000000100)="eb26c9b382db0f14007840074f640ce613377a37a30fcba463f098f246d1c6da4e71385448c35618aa4302f339990dcd7ef03b0bf2d58239c044df805f28be0abcbecd57be803ed733aaa7a5467d017b1a4d5a9f49889824e50452e3935762d5a9e80c5fb00941d5ecb7b8fcdad455808c95ff348b624a43eb31420b2e7641cd172899c52f3080caea35e1507d50ce1363ba951584be3b70a3defe1612135fef9035ec63c91703c93284e28f0fb889b6eccf13a6f9fa6fbeacddf55c7db2fbec1efaa8b46dab3b3c93277208b75c0508865cbfe9bf601e7f0cf7074012cc771a7c3d9186e9061f1013fb11", 0xeb) 07:22:21 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) sendmsg(r0, &(0x7f0000000640)={&(0x7f0000000040)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x6d, &(0x7f0000000580)=[{&(0x7f0000000140)="5046e5ffc3323dff9a7784b634c2a11627389389fe423ce6eac995f9bf0bc43795d8ea2dec6962f272f2d244335731c9c4240a873c164a5b4019232f34185e771f78df420edfd9eb72b8898c17f19095a76f98d61aaf25965a7504b5ce07", 0x5e}, {&(0x7f0000000280)="dfb3c37e17371cdadeb5e03903c232530502372601d5af3ed953e655ecd1dccfb18b274eedeb7d21885ce588cb901c83cfe459d81bfee8f316882561fa934da15ca2a185eaa4d866deac8281a2d5fa96a4eb4d8464728ba3d1b9537f8610ae063af1cf4685d632ff4661d227f3a11581814ef7dde34948b0452014c3415a2288e9736b9751eea4ef021dd0526cc763dcdde1bab27eea9cc2", 0x98}, {&(0x7f0000000680)="5d12658c40eef1ad906e5d7cdd3c749f6e87222d494995a709dd24c3b627b2b50d861c25df5bd75274c0c95355e7e9a4c91b4eadb31fd0e462924bf2c43bd5ba5cfff4eed83498734e3199fe64b7afa9ef4980a5e6adf88f22bd55d8a6d43ca3108aed", 0x63}, {&(0x7f00000003c0)="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", 0xfa}, {&(0x7f00000004c0)="d0ecccadbcc15fbdef4f2b8a7165b1a015c2aa8443d340f2e4b81ea6b401d4b4dab16ebcdd7eeb9a65cbeb2343ffbf4eb418d7f261f43f97f0488e5d8fea157091957ac4d81797bde8eb6b1f696b49e49a9a9667fe4f6b6b5abe14ecbba0eae9ee85d655b444d65b50959ce9dc570b0448875e3cdc7dabbd22f1a867e2e7cb690f3e57a3d94d9aa6017820ad272ef95214debc74af15372231482d30c166518fd061321aa8511e", 0xa7}], 0x5, &(0x7f0000000600)=[{0x40, 0x100, 0x2d32, "bb892c7b9df57af8bba6ede19afbfb8cffa88042065901201d6b264de77dfaec385d155216a7239afda297302582"}], 0x40}, 0xd0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000370000/0x3000)=nil, 0x3000, 0x200000c, 0x4000010, r0, 0x307ac000) open(&(0x7f0000000340)='./file0\x00', 0x20100, 0x101) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1004305aaaf231872bb36e3179"]) 07:22:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000417000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 1027.325747][T31028] FAT-fs (loop4): Directory bread(block 6) failed [ 1027.337567][T31027] EXT4-fs (loop5): error: could not find journal device path: error -2 [ 1027.352768][T31035] EXT4-fs (loop1): bad geometry: block count 5120 exceeds size of device (525 blocks) 07:22:21 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000000)={0xa, 0x0, @loopback}, 0x18) 07:22:21 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt(r0, 0x9, 0x8, &(0x7f0000000100)="eb26c9b382db0f14007840074f640ce613377a37a30fcba463f098f246d1c6da4e71385448c35618aa4302f339990dcd7ef03b0bf2d58239c044df805f28be0abcbecd57be803ed733aaa7a5467d017b1a4d5a9f49889824e50452e3935762d5a9e80c5fb00941d5ecb7b8fcdad455808c95ff348b624a43eb31420b2e7641cd172899c52f3080caea35e1507d50ce1363ba951584be3b70a3defe1612135fef9035ec63c91703c93284e28f0fb889b6eccf13a6f9fa6fbeacddf55c7db2fbec1efaa8b46dab3b3c93277208b75c0508865cbfe9bf601e7f0cf7074012cc771a7c3d9186e9061f1013fb11", 0xeb) [ 1027.485756][T31049] EXT4-fs (loop1): bad geometry: block count 5892 exceeds size of device (525 blocks) [ 1027.535898][T31056] FAT-fs (loop4): Unrecognized mount option "0Z1+n1y" or missing value [ 1027.546507][T31049] EXT4-fs (loop1): bad geometry: block count 5892 exceeds size of device (525 blocks) 07:22:22 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000100)={r2}) 07:22:22 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000004801000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:22:22 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt(r0, 0x9, 0x8, &(0x7f0000000100)="eb26c9b382db0f14007840074f640ce613377a37a30fcba463f098f246d1c6da4e71385448c35618aa4302f339990dcd7ef03b0bf2d58239c044df805f28be0abcbecd57be803ed733aaa7a5467d017b1a4d5a9f49889824e50452e3935762d5a9e80c5fb00941d5ecb7b8fcdad455808c95ff348b624a43eb31420b2e7641cd172899c52f3080caea35e1507d50ce1363ba951584be3b70a3defe1612135fef9035ec63c91703c93284e28f0fb889b6eccf13a6f9fa6fbeacddf55c7db2fbec1efaa8b46dab3b3c93277208b75c0508865cbfe9bf601e7f0cf7074012cc771a7c3d9186e9061f1013fb11", 0xeb) 07:22:22 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000000)={0xa, 0x0, @loopback}, 0x18) 07:22:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000419000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:22:22 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xfffffffffffff6c9, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c00800000eb650c747400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)={[{@shortname_mixed}, {}], [{@dont_appraise}, {@measure}]}) r2 = fspick(r1, &(0x7f0000000000)='./file0\x00', 0x1) fsconfig$FSCONFIG_SET_PATH_EMPTY(r2, 0x4, &(0x7f0000000040)='})\x00', &(0x7f0000000140)='./file0\x00', r0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x80040, 0x0) openat(r3, &(0x7f0000000280)='./file0\x00', 0x2, 0x21) r4 = getpid() sendmsg$nl_route(r3, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000440)=@ipv6_deladdr={0xa0, 0x15, 0x20, 0x70bd2b, 0x25dfdbfc, {0xa, 0x1f, 0x10, 0xfd}, [@IFA_CACHEINFO={0x14, 0x6, {0x3, 0x6, 0x6b7, 0x100}}, @IFA_FLAGS={0x8}, @IFA_CACHEINFO={0x14, 0x6, {0x4, 0xb7bc, 0xffffffff, 0x3}}, @IFA_LOCAL={0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @IFA_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_FLAGS={0x8, 0x8, 0x4}, @IFA_LOCAL={0x14, 0x2, @private0}]}, 0xa0}, 0x1, 0x0, 0x0, 0xc0}, 0x20008841) rt_tgsigqueueinfo(r4, r4, 0x0, &(0x7f0000000380)) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/vmstat\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x5, 0x6, 0x0, 0x20, 0x0, 0x4, 0x0, 0x5, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x8, 0x6}, 0x2040, 0x5, 0x80, 0x1, 0xa82b, 0x9, 0x400, 0x0, 0x5, 0x0, 0x6}, r4, 0xffffffffffffffff, r5, 0x9) [ 1028.165877][ T22] audit: type=1326 audit(1621927342.670:1214): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=31031 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7fc00000 07:22:22 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000200)) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt(r0, 0x9, 0x8, &(0x7f0000000100)="eb26c9b382db0f14007840074f640ce613377a37a30fcba463f098f246d1c6da4e71385448c35618aa4302f339990dcd7ef03b0bf2d58239c044df805f28be0abcbecd57be803ed733aaa7a5467d017b1a4d5a9f49889824e50452e3935762d5a9e80c5fb00941d5ecb7b8fcdad455808c95ff348b624a43eb31420b2e7641cd172899c52f3080caea35e1507d50ce1363ba951584be3b70a3defe1612135fef9035ec63c91703c93284e28f0fb889b6eccf13a6f9fa6fbeacddf55c7db2fbec1efaa8b46dab3b3c93277208b75c0508865cbfe9bf601e7f0cf7074012cc771a7c3d9186e9061f1013fb11", 0xeb) 07:22:22 executing program 0: ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000000)={0xa, 0x0, @loopback}, 0x18) [ 1028.238401][T31070] FAT-fs (loop4): Unrecognized mount option "dont_appraise" or missing value [ 1028.252257][T31072] EXT4-fs (loop5): error: could not find journal device path: error -2 [ 1028.253534][T31073] EXT4-fs (loop1): bad geometry: block count 6404 exceeds size of device (525 blocks) 07:22:22 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000200)) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt(r0, 0x9, 0x8, &(0x7f0000000100)="eb26c9b382db0f14007840074f640ce613377a37a30fcba463f098f246d1c6da4e71385448c35618aa4302f339990dcd7ef03b0bf2d58239c044df805f28be0abcbecd57be803ed733aaa7a5467d017b1a4d5a9f49889824e50452e3935762d5a9e80c5fb00941d5ecb7b8fcdad455808c95ff348b624a43eb31420b2e7641cd172899c52f3080caea35e1507d50ce1363ba951584be3b70a3defe1612135fef9035ec63c91703c93284e28f0fb889b6eccf13a6f9fa6fbeacddf55c7db2fbec1efaa8b46dab3b3c93277208b75c0508865cbfe9bf601e7f0cf7074012cc771a7c3d9186e9061f1013fb11", 0xeb) 07:22:22 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000004c01000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:22:22 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000200)) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt(r0, 0x9, 0x8, &(0x7f0000000100)="eb26c9b382db0f14007840074f640ce613377a37a30fcba463f098f246d1c6da4e71385448c35618aa4302f339990dcd7ef03b0bf2d58239c044df805f28be0abcbecd57be803ed733aaa7a5467d017b1a4d5a9f49889824e50452e3935762d5a9e80c5fb00941d5ecb7b8fcdad455808c95ff348b624a43eb31420b2e7641cd172899c52f3080caea35e1507d50ce1363ba951584be3b70a3defe1612135fef9035ec63c91703c93284e28f0fb889b6eccf13a6f9fa6fbeacddf55c7db2fbec1efaa8b46dab3b3c93277208b75c0508865cbfe9bf601e7f0cf7074012cc771a7c3d9186e9061f1013fb11", 0xeb) [ 1028.286974][ T22] audit: type=1326 audit(1621927342.670:1215): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=31031 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=16 compat=0 ip=0x4665d9 code=0x7fc00000 07:22:22 executing program 0: ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000000)={0xa, 0x0, @loopback}, 0x18) [ 1028.369213][T31073] EXT4-fs (loop1): bad geometry: block count 6404 exceeds size of device (525 blocks) [ 1028.507765][T31096] EXT4-fs (loop5): error: could not find journal device path: error -2 07:22:23 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000100)={r2}) 07:22:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="20000000041b000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:22:23 executing program 0: ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000000)={0xa, 0x0, @loopback}, 0x18) 07:22:23 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000006001000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:22:23 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt(r1, 0x9, 0x8, &(0x7f0000000100)="eb26c9b382db0f14007840074f640ce613377a37a30fcba463f098f246d1c6da4e71385448c35618aa4302f339990dcd7ef03b0bf2d58239c044df805f28be0abcbecd57be803ed733aaa7a5467d017b1a4d5a9f49889824e50452e3935762d5a9e80c5fb00941d5ecb7b8fcdad455808c95ff348b624a43eb31420b2e7641cd172899c52f3080caea35e1507d50ce1363ba951584be3b70a3defe1612135fef9035ec63c91703c93284e28f0fb889b6eccf13a6f9fa6fbeacddf55c7db2fbec1efaa8b46dab3b3c93277208b75c0508865cbfe9bf601e7f0cf7074012cc771a7c3d9186e9061f1013fb11", 0xeb) 07:22:23 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mount$incfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000140), 0x2800000, &(0x7f0000000180)) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) ioctl$BTRFS_IOC_SPACE_INFO(r0, 0xc0109414, &(0x7f0000000280)={0x84c, 0x100000000, ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)) [ 1029.059518][ T22] audit: type=1326 audit(1621927343.560:1216): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=31068 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7fc00000 07:22:23 executing program 0: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000000)={0xa, 0x0, @loopback}, 0x18) 07:22:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="20000000001c000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:22:23 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt(r1, 0x9, 0x8, &(0x7f0000000100)="eb26c9b382db0f14007840074f640ce613377a37a30fcba463f098f246d1c6da4e71385448c35618aa4302f339990dcd7ef03b0bf2d58239c044df805f28be0abcbecd57be803ed733aaa7a5467d017b1a4d5a9f49889824e50452e3935762d5a9e80c5fb00941d5ecb7b8fcdad455808c95ff348b624a43eb31420b2e7641cd172899c52f3080caea35e1507d50ce1363ba951584be3b70a3defe1612135fef9035ec63c91703c93284e28f0fb889b6eccf13a6f9fa6fbeacddf55c7db2fbec1efaa8b46dab3b3c93277208b75c0508865cbfe9bf601e7f0cf7074012cc771a7c3d9186e9061f1013fb11", 0xeb) 07:22:23 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000006801000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) [ 1029.129170][T31115] EXT4-fs (loop5): error: could not find journal device path: error -2 [ 1029.132876][T31114] EXT4-fs (loop1): bad geometry: block count 6916 exceeds size of device (525 blocks) [ 1029.160070][T31118] FAT-fs (loop4): Directory bread(block 6) failed 07:22:23 executing program 0: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000000)={0xa, 0x0, @loopback}, 0x18) 07:22:23 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt(r1, 0x9, 0x8, &(0x7f0000000100)="eb26c9b382db0f14007840074f640ce613377a37a30fcba463f098f246d1c6da4e71385448c35618aa4302f339990dcd7ef03b0bf2d58239c044df805f28be0abcbecd57be803ed733aaa7a5467d017b1a4d5a9f49889824e50452e3935762d5a9e80c5fb00941d5ecb7b8fcdad455808c95ff348b624a43eb31420b2e7641cd172899c52f3080caea35e1507d50ce1363ba951584be3b70a3defe1612135fef9035ec63c91703c93284e28f0fb889b6eccf13a6f9fa6fbeacddf55c7db2fbec1efaa8b46dab3b3c93277208b75c0508865cbfe9bf601e7f0cf7074012cc771a7c3d9186e9061f1013fb11", 0xeb) [ 1029.247503][T31118] FAT-fs (loop4): Directory bread(block 6) failed [ 1029.271694][T31118] incfs: Can't find or create .index dir in ./file0 [ 1029.282784][T31139] EXT4-fs (loop1): bad geometry: block count 7168 exceeds size of device (525 blocks) [ 1029.294960][T31140] EXT4-fs (loop5): error: could not find journal device path: error -2 [ 1029.323661][T11764] BUG: Dentry ffff888179d94000{i=0,n=.index} still in use (1) [unmount of vfat loop4] [ 1029.333485][T11764] ------------[ cut here ]------------ [ 1029.339041][T11764] WARNING: CPU: 1 PID: 11764 at fs/dcache.c:1597 umount_check+0x179/0x1c0 [ 1029.347522][T11764] Modules linked in: [ 1029.351447][T11764] CPU: 1 PID: 11764 Comm: syz-executor.4 Tainted: G W 5.4.121-syzkaller-00749-gc6775ce1621b #0 [ 1029.363055][T11764] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1029.373511][T11764] RIP: 0010:umount_check+0x179/0x1c0 [ 1029.379068][T11764] Code: ff 4c 8b 0b 48 81 c5 20 04 00 00 48 c7 c7 e0 01 e9 84 4c 89 fe 4c 89 f2 4c 89 f9 45 89 e8 31 c0 55 e8 b7 a9 af ff 48 83 c4 08 <0f> 0b e9 fd fe ff ff 89 e9 80 e1 07 80 c1 03 38 c1 0f 8c d4 fe ff [ 1029.399223][T11764] RSP: 0018:ffff8881a7c87c58 EFLAGS: 00010282 [ 1029.405279][T11764] RAX: 0000000000000054 RBX: ffffffff85fc59a0 RCX: 32ca984f89eb0000 [ 1029.413251][T11764] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000000 [ 1029.421214][T11764] RBP: ffff88819d296420 R08: ffffffff814e8397 R09: ffffed103ede5e08 [ 1029.429178][T11764] R10: ffffed103ede5e08 R11: 0000000000000000 R12: dffffc0000000000 [ 1029.437143][T11764] R13: 0000000000000001 R14: 0000000000000000 R15: ffff888179d94000 [ 1029.445110][T11764] FS: 00000000018f2400(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 1029.454300][T11764] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1029.460883][T11764] CR2: 0000000020000001 CR3: 00000001a2a65000 CR4: 00000000001426e0 [ 1029.469027][T11764] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1029.477006][T11764] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1029.486050][T11764] Call Trace: [ 1029.489544][T11764] d_walk+0x2d9/0x540 [ 1029.493608][T11764] ? __d_free+0x20/0x20 [ 1029.498210][T11764] shrink_dcache_for_umount+0x8a/0x1a0 [ 1029.503665][T11764] generic_shutdown_super+0x63/0x2a0 [ 1029.508943][T11764] kill_block_super+0x79/0xd0 [ 1029.513612][T11764] deactivate_locked_super+0xaf/0x100 [ 1029.518981][T11764] deactivate_super+0x1b3/0x270 [ 1029.524001][T11764] ? deactivate_locked_super+0x100/0x100 [ 1029.529769][T11764] ? dput+0x4de/0x5d0 [ 1029.533832][T11764] ? _raw_spin_lock_irqsave+0x210/0x210 [ 1029.539404][T11764] ? find_next_bit+0xc6/0x110 [ 1029.544080][T11764] cleanup_mnt+0x432/0x4e0 [ 1029.548490][T11764] ? switch_fpu_return+0x10/0x10 [ 1029.553425][T11764] task_work_run+0x186/0x1b0 [ 1029.558096][T11764] prepare_exit_to_usermode+0x2b0/0x310 [ 1029.563900][T11764] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1029.569783][T11764] RIP: 0033:0x467a37 [ 1029.573667][T11764] Code: ff d0 48 89 c7 b8 3c 00 00 00 0f 05 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1029.593432][T11764] RSP: 002b:00007ffcfbf96718 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 1029.602009][T11764] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000467a37 [ 1029.610406][T11764] RDX: 00007ffcfbf967ec RSI: 0000000000000002 RDI: 00007ffcfbf967e0 [ 1029.618893][T11764] RBP: 00007ffcfbf967e0 R08: 00000000ffffffff R09: 00007ffcfbf965b0 [ 1029.626863][T11764] R10: 00000000018f3bd3 R11: 0000000000000246 R12: 00000000004bee70 [ 1029.634835][T11764] R13: 00007ffcfbf978b0 R14: 00000000018f3b00 R15: 00007ffcfbf978f0 [ 1029.642806][T11764] ---[ end trace 85c3e3ebd4e8ebfe ]--- [ 1029.657615][T11764] VFS: Busy inodes after unmount of loop4. Self-destruct in 5 seconds. Have a nice day... 07:22:24 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000100)={r2}) 07:22:24 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x0, 0xca1, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)) 07:22:24 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt(0xffffffffffffffff, 0x9, 0x8, &(0x7f0000000100)="eb26c9b382db0f14007840074f640ce613377a37a30fcba463f098f246d1c6da4e71385448c35618aa4302f339990dcd7ef03b0bf2d58239c044df805f28be0abcbecd57be803ed733aaa7a5467d017b1a4d5a9f49889824e50452e3935762d5a9e80c5fb00941d5ecb7b8fcdad455808c95ff348b624a43eb31420b2e7641cd172899c52f3080caea35e1507d50ce1363ba951584be3b70a3defe1612135fef9035ec63c91703c93284e28f0fb889b6eccf13a6f9fa6fbeacddf55c7db2fbec1efaa8b46dab3b3c93277208b75c0508865cbfe9bf601e7f0cf7074012cc771a7c3d9186e9061f1013fb11", 0xeb) 07:22:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000020000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:22:24 executing program 0: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000000)={0xa, 0x0, @loopback}, 0x18) 07:22:24 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000006c01000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) [ 1029.951260][ T22] audit: type=1326 audit(1621927344.450:1217): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=31112 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7fc00000 07:22:24 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt(0xffffffffffffffff, 0x9, 0x8, &(0x7f0000000100)="eb26c9b382db0f14007840074f640ce613377a37a30fcba463f098f246d1c6da4e71385448c35618aa4302f339990dcd7ef03b0bf2d58239c044df805f28be0abcbecd57be803ed733aaa7a5467d017b1a4d5a9f49889824e50452e3935762d5a9e80c5fb00941d5ecb7b8fcdad455808c95ff348b624a43eb31420b2e7641cd172899c52f3080caea35e1507d50ce1363ba951584be3b70a3defe1612135fef9035ec63c91703c93284e28f0fb889b6eccf13a6f9fa6fbeacddf55c7db2fbec1efaa8b46dab3b3c93277208b75c0508865cbfe9bf601e7f0cf7074012cc771a7c3d9186e9061f1013fb11", 0xeb) 07:22:24 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000000)={0xa, 0x0, @loopback}, 0x18) 07:22:24 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt(0xffffffffffffffff, 0x9, 0x8, &(0x7f0000000100)="eb26c9b382db0f14007840074f640ce613377a37a30fcba463f098f246d1c6da4e71385448c35618aa4302f339990dcd7ef03b0bf2d58239c044df805f28be0abcbecd57be803ed733aaa7a5467d017b1a4d5a9f49889824e50452e3935762d5a9e80c5fb00941d5ecb7b8fcdad455808c95ff348b624a43eb31420b2e7641cd172899c52f3080caea35e1507d50ce1363ba951584be3b70a3defe1612135fef9035ec63c91703c93284e28f0fb889b6eccf13a6f9fa6fbeacddf55c7db2fbec1efaa8b46dab3b3c93277208b75c0508865cbfe9bf601e7f0cf7074012cc771a7c3d9186e9061f1013fb11", 0xeb) [ 1030.011832][T31156] EXT4-fs (loop1): bad geometry: block count 8192 exceeds size of device (525 blocks) [ 1030.035356][T31159] FAT-fs (loop4): Directory bread(block 6) failed 07:22:24 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800008, 0x12, r0, 0x0) getdents64(r0, &(0x7f0000000280)=""/208, 0xd0) preadv(r0, &(0x7f0000000280), 0x0, 0x68, 0x0) openat(r0, &(0x7f0000000000)='./file0\x00', 0x121006, 0x20) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000080)='./file0\x00', 0x9, 0x0, &(0x7f0000001440), 0x10000, &(0x7f0000000100)=ANY=[@ANYBLOB="736d61636b6673646566b46475626a5f757365722c7375626a5f74797004000000000000006f626a5f726f6c653d252c7375626a5f757365723d76666174002c00a87d6ca978adf726cea4996b2a547b9e8923928df4909029df4811294bfd7c447c7f2c77c439b5969bde8a5403cdb32ff7987900ea58c2d1808f8d"]) 07:22:24 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt(r1, 0x0, 0x8, &(0x7f0000000100)="eb26c9b382db0f14007840074f640ce613377a37a30fcba463f098f246d1c6da4e71385448c35618aa4302f339990dcd7ef03b0bf2d58239c044df805f28be0abcbecd57be803ed733aaa7a5467d017b1a4d5a9f49889824e50452e3935762d5a9e80c5fb00941d5ecb7b8fcdad455808c95ff348b624a43eb31420b2e7641cd172899c52f3080caea35e1507d50ce1363ba951584be3b70a3defe1612135fef9035ec63c91703c93284e28f0fb889b6eccf13a6f9fa6fbeacddf55c7db2fbec1efaa8b46dab3b3c93277208b75c0508865cbfe9bf601e7f0cf7074012cc771a7c3d9186e9061f1013fb11", 0xeb) 07:22:24 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000000)={0xa, 0x0, @loopback}, 0x18) [ 1030.070792][T31161] EXT4-fs (loop5): error: could not find journal device path: error -2 [ 1030.099461][T31156] EXT4-fs (loop1): bad geometry: block count 8192 exceeds size of device (525 blocks) [ 1030.845590][ T22] audit: type=1326 audit(1621927345.350:1218): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=31157 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7fc00000 [ 1030.870053][ T22] audit: type=1326 audit(1621927345.350:1219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=31157 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=16 compat=0 ip=0x4665d9 code=0x7fc00000 [ 1030.894213][ T22] audit: type=1326 audit(1621927345.350:1220): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=31157 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7fc00000 [ 1030.919322][ T22] audit: type=1326 audit(1621927345.350:1221): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=31157 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7fc00000 07:22:25 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000100)={r2}) 07:22:25 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt(r1, 0x0, 0x8, &(0x7f0000000100)="eb26c9b382db0f14007840074f640ce613377a37a30fcba463f098f246d1c6da4e71385448c35618aa4302f339990dcd7ef03b0bf2d58239c044df805f28be0abcbecd57be803ed733aaa7a5467d017b1a4d5a9f49889824e50452e3935762d5a9e80c5fb00941d5ecb7b8fcdad455808c95ff348b624a43eb31420b2e7641cd172899c52f3080caea35e1507d50ce1363ba951584be3b70a3defe1612135fef9035ec63c91703c93284e28f0fb889b6eccf13a6f9fa6fbeacddf55c7db2fbec1efaa8b46dab3b3c93277208b75c0508865cbfe9bf601e7f0cf7074012cc771a7c3d9186e9061f1013fb11", 0xeb) 07:22:25 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000007401000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:22:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="20000000002e000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:22:25 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000000)={0xa, 0x0, @loopback}, 0x18) 07:22:25 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0xbd246000) move_mount(r0, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)) [ 1030.944875][ T22] audit: type=1326 audit(1621927345.350:1222): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=31157 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7fc00000 [ 1030.970525][ T22] audit: type=1326 audit(1621927345.350:1223): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=31157 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7fc00000 07:22:25 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000000)={0xa, 0x0, @loopback}, 0x18) 07:22:25 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt(r1, 0x0, 0x8, &(0x7f0000000100)="eb26c9b382db0f14007840074f640ce613377a37a30fcba463f098f246d1c6da4e71385448c35618aa4302f339990dcd7ef03b0bf2d58239c044df805f28be0abcbecd57be803ed733aaa7a5467d017b1a4d5a9f49889824e50452e3935762d5a9e80c5fb00941d5ecb7b8fcdad455808c95ff348b624a43eb31420b2e7641cd172899c52f3080caea35e1507d50ce1363ba951584be3b70a3defe1612135fef9035ec63c91703c93284e28f0fb889b6eccf13a6f9fa6fbeacddf55c7db2fbec1efaa8b46dab3b3c93277208b75c0508865cbfe9bf601e7f0cf7074012cc771a7c3d9186e9061f1013fb11", 0xeb) 07:22:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000040000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:22:25 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000000)={0xa, 0x0, @loopback}, 0x18) 07:22:25 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt(r1, 0x9, 0x0, &(0x7f0000000100)="eb26c9b382db0f14007840074f640ce613377a37a30fcba463f098f246d1c6da4e71385448c35618aa4302f339990dcd7ef03b0bf2d58239c044df805f28be0abcbecd57be803ed733aaa7a5467d017b1a4d5a9f49889824e50452e3935762d5a9e80c5fb00941d5ecb7b8fcdad455808c95ff348b624a43eb31420b2e7641cd172899c52f3080caea35e1507d50ce1363ba951584be3b70a3defe1612135fef9035ec63c91703c93284e28f0fb889b6eccf13a6f9fa6fbeacddf55c7db2fbec1efaa8b46dab3b3c93277208b75c0508865cbfe9bf601e7f0cf7074012cc771a7c3d9186e9061f1013fb11", 0xeb) [ 1031.067503][T31201] EXT4-fs (loop1): bad geometry: block count 11776 exceeds size of device (525 blocks) [ 1031.086536][T31200] EXT4-fs (loop5): error: could not find journal device path: error -2 [ 1031.096800][T31204] FAT-fs (loop4): Directory bread(block 6) failed 07:22:25 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000007a01000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) [ 1031.180920][T31219] EXT4-fs (loop1): bad geometry: block count 16384 exceeds size of device (525 blocks) [ 1031.314966][T31229] EXT4-fs (loop5): error: could not find journal device path: error -2 [ 1031.325942][T31219] EXT4-fs (loop1): bad geometry: block count 16384 exceeds size of device (525 blocks) 07:22:26 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000100)={r2}) 07:22:26 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt(r1, 0x9, 0x0, 0x0, 0x0) 07:22:26 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000003480)=[{&(0x7f0000000140)=""/122, 0x7a}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/4096, 0x1000}, {&(0x7f0000002440)=""/61, 0x3d}, {&(0x7f0000002480)=""/4096, 0x1000}], 0x5, 0x99e, 0x1ae7c1f7) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)) r1 = eventfd2(0x10000, 0x1) preadv(r1, &(0x7f0000000040)=[{&(0x7f0000000280)=""/174, 0xae}, {&(0x7f0000000000)=""/19, 0x13}, {&(0x7f0000000340)=""/209, 0xd1}], 0x3, 0x9, 0x20) 07:22:26 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000000)={0xa, 0x0, @loopback}, 0x18) 07:22:26 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f00000001000000000026ae01000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:22:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000383000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:22:26 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000000)={0xa, 0x0, @loopback}, 0x18) 07:22:26 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000140)={'ip6_vti0\x00', {0x2, 0x0, @initdev}}) r3 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r3, 0x0, 0x40, &(0x7f0000000000)={'nat\x00'}, &(0x7f0000000240)=0x54) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10) bind$inet(r2, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) connect$unix(r0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) 07:22:26 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f00000001000000000001b601000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:22:26 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000000)={0xa, 0x0, @loopback}, 0x18) 07:22:26 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000140)={'ip6_vti0\x00', {0x2, 0x0, @initdev}}) r3 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r3, 0x0, 0x40, &(0x7f0000000000)={'nat\x00'}, &(0x7f0000000240)=0x54) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10) bind$inet(r2, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) connect$unix(r0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) [ 1031.969744][T31243] EXT4-fs (loop1): bad geometry: block count 33539 exceeds size of device (525 blocks) [ 1031.983094][T31244] FAT-fs (loop4): Directory bread(block 6) failed [ 1031.996946][T31242] EXT4-fs (loop5): error: could not find journal device path: error -2 07:22:26 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000000)={0xa, 0x0, @loopback}, 0x18) [ 1032.079218][T31243] EXT4-fs (loop1): bad geometry: block count 33539 exceeds size of device (525 blocks) [ 1032.192450][T31268] EXT4-fs (loop5): error: could not find journal device path: error -2 07:22:27 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000100)={r2}) 07:22:27 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x10e907b36ca2f88c, 0x0) ioctl(r1, 0xfffffffb, &(0x7f0000000040)="7939bbdfd36d8a0fc11d27078f66d62907d58988bece91f6faecd38f021c7ff2483efdd12619ca8bd7f82fb016679824d558bee9") mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)) 07:22:27 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000140)={'ip6_vti0\x00', {0x2, 0x0, @initdev}}) r3 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r3, 0x0, 0x40, &(0x7f0000000000)={'nat\x00'}, &(0x7f0000000240)=0x54) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10) bind$inet(r2, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) connect$unix(r0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) 07:22:27 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, @loopback}, 0x18) 07:22:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000384000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:22:27 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f00000001000000000001b701000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:22:27 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000140)={'ip6_vti0\x00', {0x2, 0x0, @initdev}}) r2 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000000)={'nat\x00'}, &(0x7f0000000240)=0x54) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10) connect$unix(r0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) 07:22:27 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, @loopback}, 0x18) 07:22:27 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000100)={r2}) 07:22:27 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x8, 0x3) preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000280)=""/4096, 0x1000}], 0x1, 0x5, 0x2) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)) [ 1032.843925][T31280] FAT-fs (loop4): Directory bread(block 6) failed [ 1032.852882][T31283] EXT4-fs (loop1): bad geometry: block count 33795 exceeds size of device (525 blocks) [ 1032.865687][T31285] EXT4-fs (loop5): error: could not find journal device path: error -2 07:22:27 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000140)={'ip6_vti0\x00', {0x2, 0x0, @initdev}}) r2 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000000)={'nat\x00'}, &(0x7f0000000240)=0x54) connect$unix(r0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) 07:22:27 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, @loopback}, 0x18) 07:22:27 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000140)={'ip6_vti0\x00', {0x2, 0x0, @initdev}}) socket$inet_udp(0x2, 0x2, 0x0) connect$unix(r0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) 07:22:27 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f00000001000000000000fc01000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) [ 1033.002975][T31283] EXT4-fs (loop1): bad geometry: block count 33795 exceeds size of device (525 blocks) 07:22:27 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, 0x0, 0x0) 07:22:27 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000140)={'ip6_vti0\x00', {0x2, 0x0, @initdev}}) connect$unix(r0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) 07:22:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000387000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:22:27 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000100)={r2}) 07:22:27 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) connect$unix(r0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) [ 1033.126385][T31311] EXT4-fs (loop5): error: could not find journal device path: error -2 [ 1033.140713][T31309] FAT-fs (loop4): Directory bread(block 6) failed 07:22:27 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, 0x0, 0x0) 07:22:27 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000000)={'nat\x00'}, &(0x7f0000000240)=0x54) recvmsg(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000380)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000140)=""/56, 0x38}], 0x1, &(0x7f0000000280)=""/185, 0xb9}, 0x40000003) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="4821d31894ce23bd1a90297be3ab02"]) 07:22:27 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) connect$unix(r0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) 07:22:27 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) connect$unix(r0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) 07:22:27 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, 0x0, 0x0) 07:22:27 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f0000000100000000000fff01000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:22:27 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000100)={r2}) 07:22:27 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) connect$unix(r0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) [ 1033.304953][T31326] EXT4-fs (loop1): bad geometry: block count 34563 exceeds size of device (525 blocks) 07:22:27 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000140)={'ip6_vti0\x00', {0x2, 0x0, @initdev}}) r3 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r3, 0x0, 0x40, &(0x7f0000000000)={'nat\x00'}, &(0x7f0000000240)=0x54) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10) bind$inet(r2, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) connect$unix(r0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) [ 1033.376364][T31340] FAT-fs (loop4): Unrecognized mount option "H!#){" or missing value [ 1033.390400][T31326] EXT4-fs (loop1): bad geometry: block count 34563 exceeds size of device (525 blocks) 07:22:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000000000219000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:22:28 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000100)={r2}) 07:22:28 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) connect$unix(r0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) 07:22:28 executing program 0: ftruncate(0xffffffffffffffff, 0x1) io_uring_enter(0xffffffffffffffff, 0x201a, 0xd8f4, 0x7, &(0x7f0000000040)={[0x200]}, 0x8) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e24, @loopback}, 0x10) [ 1033.444077][T31346] EXT4-fs (loop5): error: could not find journal device path: error -2 07:22:28 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000080)) 07:22:28 executing program 2: ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) [ 1033.498600][T31353] FAT-fs (loop4): Unrecognized mount option "H!#){" or missing value 07:22:28 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000100)={r2}) 07:22:28 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000000000040000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:22:28 executing program 0: ftruncate(0xffffffffffffffff, 0x1) io_uring_enter(0xffffffffffffffff, 0x201a, 0xd8f4, 0x7, &(0x7f0000000040)={[0x200]}, 0x8) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e24, @loopback}, 0x10) 07:22:28 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x0, 0x0}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000100)={r2}) 07:22:28 executing program 2: ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) 07:22:28 executing program 0: ftruncate(0xffffffffffffffff, 0x1) io_uring_enter(0xffffffffffffffff, 0x201a, 0xd8f4, 0x7, &(0x7f0000000040)={[0x200]}, 0x8) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e24, @loopback}, 0x10) [ 1033.637877][T31378] EXT4-fs (loop5): error: could not find journal device path: error -2 [ 1033.646642][T31369] EXT4-fs (loop1): bad geometry: block count 33554432 exceeds size of device (525 blocks) [ 1033.732546][T31377] FAT-fs (loop4): bogus number of reserved sectors [ 1033.740457][T31377] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1033.750508][T31369] EXT4-fs (loop1): bad geometry: block count 33554432 exceeds size of device (525 blocks) 07:22:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000001d43c19000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:22:28 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x0, 0x0}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000100)={r2}) 07:22:28 executing program 2: ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) 07:22:28 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000000000050000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:22:28 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000000)={'nat\x00'}, &(0x7f0000000240)=0x54) getsockopt$ARPT_SO_GET_INFO(r1, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x0, [0x80, 0x10000, 0x4]}, &(0x7f0000000140)=0x44) 07:22:28 executing program 0: ftruncate(0xffffffffffffffff, 0x1) io_uring_enter(0xffffffffffffffff, 0x201a, 0xd8f4, 0x7, &(0x7f0000000040)={[0x200]}, 0x8) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$inet_udp(0x2, 0x2, 0x0) 07:22:28 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) connect$unix(r0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) 07:22:28 executing program 0: ftruncate(0xffffffffffffffff, 0x1) io_uring_enter(0xffffffffffffffff, 0x201a, 0xd8f4, 0x7, &(0x7f0000000040)={[0x200]}, 0x8) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) 07:22:28 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) connect$unix(r0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) 07:22:28 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x0, 0x0}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000100)={r2}) [ 1033.931928][T31405] FAT-fs (loop4): Directory bread(block 6) failed [ 1033.966944][T31400] EXT4-fs (loop1): bad geometry: block count 1020526848 exceeds size of device (525 blocks) 07:22:28 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) connect$unix(r0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) 07:22:28 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000100)={r2}) [ 1033.979016][T31406] EXT4-fs (loop5): error: could not find journal device path: error -2 [ 1034.106837][T31400] EXT4-fs (loop1): bad geometry: block count 1020526848 exceeds size of device (525 blocks) 07:22:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000001d38419000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:22:28 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000000000390000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:22:28 executing program 0: ftruncate(0xffffffffffffffff, 0x1) io_uring_enter(0xffffffffffffffff, 0x201a, 0xd8f4, 0x7, &(0x7f0000000040)={[0x200]}, 0x8) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)) 07:22:28 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) 07:22:28 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000100)={r2}) 07:22:28 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_icmp(0x2, 0x2, 0x1) r2 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000000)={'nat\x00'}, &(0x7f0000000240)=0x54) ioctl$FICLONERANGE(r1, 0x4020940d, &(0x7f0000000000)={{r2}, 0x7fff, 0x1, 0x6}) 07:22:28 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000100)={r2}) 07:22:28 executing program 0: ftruncate(0xffffffffffffffff, 0x1) io_uring_enter(0xffffffffffffffff, 0x201a, 0xd8f4, 0x7, &(0x7f0000000040)={[0x200]}, 0x8) 07:22:28 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000100)={r2}) [ 1034.276263][T31439] EXT4-fs (loop1): bad geometry: block count 2228420864 exceeds size of device (525 blocks) [ 1034.288835][T31432] EXT4-fs (loop5): error: could not find journal device path: error -2 07:22:28 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) preadv(r1, &(0x7f0000000140), 0x0, 0x3, 0xe221) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000000)={'nat\x00'}, &(0x7f0000000240)=0x54) r2 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000000)={'nat\x00'}, &(0x7f0000000240)=0x54) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17, 0xfffffffffffffffd}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="190502a4bd53c10db44d0cbc38cbfc6e11c1f8db9375d74293f6d6c18c16ece5c3255004bfb5853c7fcb3e629baaddbd92ba0e8d6e5ad33028a0e569f733a0ef9d63c4e45484a4cba01c9b974950901765cd508e33a49469ee4e7b397a23c53b478dbf81d9098eb223b82b4c064f3c217f9542d195a7498e6541925b1d7656e358306014182d6fe4feafd1fde19492f5dd78e4dffb22da0127bdfeb31fa936bf5919dbbd60689aaaf5a0834d3361309463023b39db138a852e699c8a61d032e716fc704c09175c116196d7b7f942395afb565b1e68057df285097f2c0c04", @ANYRES32=r2, @ANYRES16=r1]) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000080)) 07:22:28 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) 07:22:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000001d2fc19000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 1034.349791][T31439] EXT4-fs (loop1): bad geometry: block count 2228420864 exceeds size of device (525 blocks) 07:22:28 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) 07:22:28 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f0000000100000000000000003f0000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:22:28 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000100)={r2}) 07:22:28 executing program 0: io_uring_enter(0xffffffffffffffff, 0x201a, 0xd8f4, 0x7, &(0x7f0000000040)={[0x200]}, 0x8) [ 1034.456330][T31451] FAT-fs (loop4): Unrecognized mount option "SM 8nۓuB%P<>bݽnZ0(i3cTˠIPeP3iN{9z#;G #+LO0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000100)={r2}) 07:22:29 executing program 0: io_uring_enter(0xffffffffffffffff, 0x0, 0xd8f4, 0x7, &(0x7f0000000040)={[0x200]}, 0x8) 07:22:29 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) connect$unix(r0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) 07:22:29 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000100)={r2}) 07:22:29 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) connect$unix(r0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) [ 1034.506785][T31465] EXT4-fs (loop1): bad geometry: block count 4241621248 exceeds size of device (525 blocks) [ 1034.521035][T31464] EXT4-fs (loop5): error: could not find journal device path: error -2 [ 1034.569631][ T22] kauditd_printk_skb: 119 callbacks suppressed [ 1034.569640][ T22] audit: type=1326 audit(1621927349.071:1343): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=31475 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 1034.658027][T31465] EXT4-fs (loop1): bad geometry: block count 4241621248 exceeds size of device (525 blocks) [ 1034.667538][T31462] FAT-fs (loop4): Unrecognized mount option "SM 8nۓuB%P<>bݽnZ0(i3cTˠIPeP3iN{9z#;G #+LO0xffffffffffffffff}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) connect$unix(r0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) 07:22:29 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000000000da0000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:22:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000003000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:22:29 executing program 0: io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000040)={[0x200]}, 0x8) 07:22:29 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x0) connect$unix(r0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) 07:22:29 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x0) connect$unix(r0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) 07:22:29 executing program 0: io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000040)={[0x200]}, 0x8) [ 1034.945046][T31494] EXT4-fs (loop5): error: could not find journal device path: error -2 [ 1034.954826][T31499] EXT4-fs (loop1): bad geometry: block count 768 exceeds size of device (525 blocks) 07:22:29 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x0) connect$unix(r0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) [ 1035.075296][T31499] EXT4-fs (loop1): bad geometry: block count 768 exceeds size of device (525 blocks) 07:22:29 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000100)={r2}) 07:22:29 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) 07:22:29 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000000400000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:22:29 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="e35ffdff0000000000000000"]) 07:22:29 executing program 0: io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000040)={[0x200]}, 0x8) 07:22:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000004000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:22:29 executing program 0: io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x7, 0x0, 0x0) 07:22:29 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) [ 1035.452495][T31525] FAT-fs (loop4): Unrecognized mount option "_" or missing value [ 1035.461545][T31526] EXT4-fs (loop1): bad geometry: block count 1024 exceeds size of device (525 blocks) 07:22:30 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) 07:22:30 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f00002f4000/0x3000)=nil, 0x3000, 0x2000000, 0x4010, r0, 0x369fc000) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x401, 0x20, 0x0, 0x20, 0x8, 0xa}, 0x48) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r1, 0x4, &(0x7f0000000640)='vfat\x00', &(0x7f0000000680)='./file0\x00', r0) ioctl$CHAR_RAW_RAGET(r0, 0x1263, &(0x7f0000000180)) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000080)=0x8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup2(r0, r0) r2 = socket$inet_udp(0x2, 0x2, 0x0) preadv(r2, &(0x7f0000000840)=[{&(0x7f0000000280)=""/185, 0xb9}, {&(0x7f0000000340)=""/112, 0xfffffffffffffd16}, {&(0x7f00000003c0)=""/194, 0xce}, {&(0x7f00000004c0)=""/12, 0xc}, {&(0x7f0000000500)=""/243, 0xf3}, {&(0x7f0000000980)=""/242, 0xf2}, {&(0x7f0000000600)=""/5, 0x5}, {&(0x7f0000000900)=""/105, 0x69}, {&(0x7f00000007c0)=""/122, 0x7a}], 0x9, 0x4, 0x400) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000000)={'nat\x00'}, &(0x7f0000000240)=0x54) sendfile(r2, r0, &(0x7f0000000140)=0x100000000, 0x7) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00dff3eb5bb0c3fe7776f87f173c3900000056000000000000000087974c4a1f5b70e63ae121af25988c515f9bee24e0b3fe2dd2ba9bfdbcd3bfabec0db6c119bb1a495caed8a22000"/88]) 07:22:30 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000100)={r2}) [ 1035.494757][ T22] audit: type=1326 audit(1621927350.001:1344): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=31523 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 1035.519317][T31527] EXT4-fs (loop5): error: could not find journal device path: error -2 07:22:30 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) connect$unix(r0, 0x0, 0x0) [ 1035.633529][T31546] FAT-fs (loop4): Directory bread(block 6) failed [ 1035.660188][T31526] EXT4-fs (loop1): bad geometry: block count 1024 exceeds size of device (525 blocks) [ 1035.682066][ T22] audit: type=1326 audit(1621927350.181:1345): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=31549 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 07:22:30 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000100)={r2}) 07:22:30 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) connect$unix(r0, 0x0, 0x0) 07:22:30 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000000500000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:22:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000005000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:22:30 executing program 4: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000000)={0x0, 0x89, 0x6d}, &(0x7f0000000140)={'enc=', 'pkcs1', ' hash=', {'streebog256-generic\x00'}}, &(0x7f0000000280)="2fc524faddc01b1cef408576e187da9d0a428d7cd7b8a9c1c2c16fa891ecc62c2a7d83b65d97a47804554ac25ea23f6c858e6307aef8f0d5f0261106d8dfa30aaacbb9114dcd7ee3c881285384c5488bdf47a180b881e91b334f94637925b462c1afd2c9739ea11d77e5c9def09ab5b0311594fc2880be64ca35728efeb18726ecad5974027ecd8dc9", &(0x7f0000000340)=""/109) r0 = add_key$keyring(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f00000002c0), &(0x7f0000000300)={'fscrypt:', @desc2}, &(0x7f0000000340)={0x0, "763f81a46af9d3d7e682d9ec61c015497a992b44a0d2b41789b2adf2666a9dc281a2f6ffbc2869a19afb4f1c790704a2be0b8f73066120d5f654bee154bf7c13"}, 0x48, r1) r2 = add_key$keyring(&(0x7f0000000680), &(0x7f00000006c0)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$unlink(0x9, r2, r1) add_key$fscrypt_v1(&(0x7f00000002c0), &(0x7f0000000300)={'fscrypt:', @auto=[0x0, 0x31, 0x38, 0x0, 0x32, 0x31, 0x38, 0x36, 0x33, 0x63, 0x39, 0x33, 0x38, 0x65, 0x31, 0x38]}, &(0x7f0000000500)={0x0, "763f81a46af9d3d7e682d9ec61c015497a992b44a0d2b41789b2adf2666a9dc281a2f6ffbc282ca19afb6f1c790704a2be0b8f730661ffd5f654bce154bf7c13", 0x3c}, 0x48, r1) r3 = add_key$keyring(&(0x7f0000000680), &(0x7f00000006c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$unlink(0x9, r3, r0) keyctl$negate(0xd, 0x0, 0x0, r0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="19"]) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/cgroups\x00', 0x0, 0x0) bind$packet(r5, &(0x7f0000000440)={0x11, 0x8, 0x0, 0x1, 0x1f, 0x6, @multicast}, 0x14) 07:22:30 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) connect$unix(r0, 0x0, 0x0) 07:22:30 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000003900000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) [ 1036.315858][T31560] EXT4-fs (loop5): error: could not find journal device path: error -2 [ 1036.322442][T31561] EXT4-fs (loop1): bad geometry: block count 1280 exceeds size of device (525 blocks) 07:22:30 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) connect$unix(r0, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e) [ 1036.362560][ T22] audit: type=1326 audit(1621927350.871:1346): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=31565 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 1036.399112][T31564] FAT-fs (loop4): Unrecognized mount option "" or missing value 07:22:30 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="002062b46b93debbc91560a3db0e7642283bf4c1878dd0a9639eb7e223897151a18c0176601509b5dd2763ba50e939c4b07e794552af8fec00992a95c236ab81accb2feb2a71ff99063c960d558db6de18a7cd0a5e74a74b959e94a2ca6ae4a9c7515d20360f06436a"]) 07:22:30 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000000)={'nat\x00'}, &(0x7f0000000240)=0x54) getsockopt$ARPT_SO_GET_INFO(r1, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x0, [0x80, 0x10000, 0x4]}, &(0x7f0000000140)=0x44) [ 1036.437514][T31561] EXT4-fs (loop1): bad geometry: block count 1280 exceeds size of device (525 blocks) 07:22:31 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000100)={r2}) 07:22:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000007000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 1036.486030][T31580] EXT4-fs (loop5): error: could not find journal device path: error -2 [ 1036.553681][ T22] audit: type=1326 audit(1621927351.061:1347): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=31588 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 1036.594493][T31589] FAT-fs (loop4): Directory bread(block 6) failed [ 1036.639157][T31596] EXT4-fs (loop1): bad geometry: block count 1792 exceeds size of device (525 blocks) [ 1036.727730][T31596] EXT4-fs (loop1): bad geometry: block count 1792 exceeds size of device (525 blocks) 07:22:31 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000100)={r2}) 07:22:31 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000000)={'nat\x00'}, &(0x7f0000000240)=0x54) getsockopt$ARPT_SO_GET_INFO(r1, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x0, [0x80, 0x10000, 0x4]}, &(0x7f0000000140)=0x44) 07:22:31 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f00000001000000000000da00000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:22:31 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x412900, 0x0) fgetxattr(r0, &(0x7f0000001680)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)=""/4096, 0x1000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(r0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000200)={0x2, 0x4e20, @broadcast}, 0x10) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000000)={'nat\x00'}, &(0x7f0000000240)=0x54) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x3, &(0x7f0000000380)={0x6, 0x0, 0x100}) fcntl$setown(r1, 0x8, r2) r3 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r3, 0x0, 0x40, &(0x7f0000000000)={'nat\x00'}, &(0x7f0000000240)=0x54) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r4, 0x0, 0x40, &(0x7f0000000000)={'nat\x00'}, &(0x7f0000000240)=0x54) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r4, 0x84009422, &(0x7f0000001280)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 07:22:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000008000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:22:31 executing program 4: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) ioctl$KVM_SET_LAPIC(r1, 0x4400ae8f, &(0x7f0000000280)={"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"}) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)) 07:22:31 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000000201000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:22:31 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000000)={'nat\x00'}, &(0x7f0000000240)=0x54) getsockopt$ARPT_SO_GET_INFO(r1, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x0, [0x80, 0x10000, 0x4]}, &(0x7f0000000140)=0x44) [ 1037.223956][T31606] EXT4-fs (loop5): error: could not find journal device path: error -2 07:22:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="20000000000a000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:22:31 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$ARPT_SO_GET_INFO(r1, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x0, [0x80, 0x10000, 0x4]}, &(0x7f0000000140)=0x44) [ 1037.291769][T31615] EXT4-fs (loop1): bad geometry: block count 2048 exceeds size of device (525 blocks) 07:22:31 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000100)={r2}) 07:22:31 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x0, [0x80, 0x10000, 0x4]}, &(0x7f0000000140)=0x44) [ 1037.354398][T31623] FAT-fs (loop4): Directory bread(block 6) failed [ 1037.361121][T31629] EXT4-fs (loop5): error: could not find journal device path: error -2 [ 1037.455590][T31638] EXT4-fs (loop1): bad geometry: block count 2560 exceeds size of device (525 blocks) [ 1037.492007][ T22] audit: type=1326 audit(1621927352.001:1348): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=31647 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 1037.536419][T31638] EXT4-fs (loop1): bad geometry: block count 2560 exceeds size of device (525 blocks) [ 1038.082668][ T22] audit: type=1326 audit(1621927352.581:1349): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=31613 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7fc00000 [ 1038.109523][ T22] audit: type=1326 audit(1621927352.591:1350): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=31613 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=16 compat=0 ip=0x4665d9 code=0x7fc00000 [ 1038.135679][ T22] audit: type=1326 audit(1621927352.591:1351): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=31613 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7fc00000 07:22:32 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000100)) 07:22:32 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x0, [0x80, 0x10000, 0x4]}, &(0x7f0000000140)=0x44) 07:22:32 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200980}, 0xc, &(0x7f0000000140)={&(0x7f0000000040)=@ipv6_getnetconf={0x3c, 0x52, 0x200, 0x70bd2d, 0x25dfdbfe, {}, [@IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x5}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xbda}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x6}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x6710e7ed}]}, 0x3c}, 0x1, 0x0, 0x0, 0x880}, 0x24000054) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)) 07:22:32 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000000301000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:22:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000010000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 1038.161099][ T22] audit: type=1326 audit(1621927352.591:1352): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=31613 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7fc00000 07:22:32 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000080)) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x0, [0x80, 0x10000, 0x4]}, &(0x7f0000000140)=0x44) 07:22:32 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f00000001c0)='./file1/file0\x00', 0xfff, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b1e00000000000000000000000000030000630b00000000", 0x1c, 0xfffffffffffffffd}, {0x0, 0x0, 0x602}], 0x0, &(0x7f0000000080)) r1 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000040), &(0x7f0000000140)='./file0\x00', 0x8, 0x1) 07:22:32 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000100)) [ 1038.249346][T31656] FAT-fs (loop4): Directory bread(block 6) failed [ 1038.264414][T31658] EXT4-fs (loop5): error: could not find journal device path: error -2 [ 1038.287762][T31661] EXT4-fs (loop1): bad geometry: block count 4096 exceeds size of device (525 blocks) 07:22:32 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$ARPT_SO_GET_INFO(r1, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x0, [0x80, 0x10000, 0x4]}, &(0x7f0000000140)=0x44) 07:22:32 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000000401000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:22:32 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$ARPT_SO_GET_INFO(r1, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x0, [0x80, 0x10000, 0x4]}, &(0x7f0000000140)=0x44) 07:22:32 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$ARPT_SO_GET_INFO(r1, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x0, [0x80, 0x10000, 0x4]}, &(0x7f0000000140)=0x44) [ 1038.506410][T31661] EXT4-fs (loop1): bad geometry: block count 4096 exceeds size of device (525 blocks) [ 1038.542924][T31691] EXT4-fs (loop5): error: could not find journal device path: error -2 07:22:33 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, &(0x7f0000000100)) 07:22:33 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$ARPT_SO_GET_INFO(r1, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x0, [0x80, 0x10000, 0x4]}, &(0x7f0000000140)=0x44) 07:22:33 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r1, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x100000002, 0xa}, 0x48) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1, 0x0, 0x0) r2 = openat(r1, &(0x7f0000000740)='./file0\x00', 0x8c101, 0x42) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x200000000000600}], 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="04", @ANYRES16=r0, @ANYRESDEC=r2]) stat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000000540)=[{&(0x7f0000000140)="43ac94f7989a45a85fe7a5abe535bc2978fa68f21169a7fc44915b08198a7c996a13e5ced73319309cff08e7f2a41a93944379a5424936b568f5d1d3221f26dac241", 0x42, 0xffffffff}, {&(0x7f0000000280)="fb32a180f9d008c521166be93385ddefc9a251e1eb05be0cae1c8e22d892dee8eb91af4a47c679f95684dd1347be3e70a6196097c0332d569dc45d48a52d28d4d8dd288c728a5fd9b83a758fbf4ffd30f76ce2066da5ee8d93810077630b41ca5be2a0e63f694d78d01d708fad9cf9338b5dd6196b6f9f8ddd78c9d8456b0225ec55327b6e40165d20be5f428c3dd85e64cbfd5150a044813d3118ddbea615056b0d1c8c3746db", 0xa7}, {&(0x7f0000000340)="a92731586df99d91093948647a86f1dd4467941d5305dd9bd4f1b3a87315c958ec4f793eb75fcb35f0528d0b309fccf3a50a1f02819832e8392446d2301c50d06f0a03c81f", 0x45, 0x7}, {&(0x7f00000003c0)="4ced2a4b25e2f9bf0ce864cf3d85d2eaa44770a82f4527fafe09f0e3e1c30c32de5441f83a6194a1142ebc5a84eacbae8c97c385b6a769f58af667843f8ab0ea57f0a40c9ab320d5a01ae75c4e461dca16c3637050e8a328f2811f04a569b6b910986eaeb4a741611ec1e115c4bbf1ba89870f859cce5546810a1de4daae94c1bdfc37804ce31b7ca7dd677f7891d6c6ba00c253433a8923ae9696e8567f7d3ec059c65d4164ac707f146073e379d3798ea37c57d8b7c845f5badbde159ce72abed0e6b3dd8709a0", 0xc8}, {&(0x7f00000004c0)="7ad494cd55e9908f30568341f81f8b4c82ea5f675282cbfbe19223a370c000ee932db016b69a943fc89a14b35cca4ec7ca524defae2a34a333876250ca5ee60f4fca61121865047522da4e2c1063341d6d2f4da6584edb2b5cb72781eb4bd3d475dada98d254427b1f1dad98d0", 0x6d, 0x8}], 0x10, &(0x7f0000000680)={[{@dioread_nolock}, {@user_xattr}], [{@smackfsdef={'smackfsdef', 0x3d, '#,+'}}, {@dont_hash}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@fowner_lt={'fowner<', r3}}, {@subj_role}, {@fowner_lt={'fowner<', 0xee00}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@fsmagic}]}) 07:22:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000014000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 07:22:33 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000000501000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:22:33 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$ARPT_SO_GET_INFO(r1, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x0, [0x80, 0x10000, 0x4]}, &(0x7f0000000140)=0x44) 07:22:33 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$ARPT_SO_GET_INFO(r1, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x0, [0x80, 0x10000, 0x4]}, &(0x7f0000000140)=0x44) [ 1039.142363][T31701] EXT4-fs (loop1): bad geometry: block count 5120 exceeds size of device (525 blocks) [ 1039.159222][T31702] EXT4-fs (loop5): error: could not find journal device path: error -2 [ 1039.160569][T31699] FAT-fs (loop4): Unrecognized mount option "" or missing value 07:22:33 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000100)) 07:22:33 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$ARPT_SO_GET_INFO(r1, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x0, [0x80, 0x10000, 0x4]}, &(0x7f0000000140)=0x44) 07:22:33 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="20000000000100000c000000ce0000000f000000010000000000000601000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0/file0'}}]}) 07:22:33 executing program 2: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x0, [0x80, 0x10000, 0x4]}, &(0x7f0000000140)=0x44)