ng program 2: 02:16:31 executing program 0: 02:16:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 613.576605][T13563] EXT4-fs warning (device loop3): ext4_enable_quotas:6165: Failed to enable quota tracking (type=1, err=-22). Please run e2fsck to fix. [ 613.630311][T13563] EXT4-fs (loop3): mount failed 02:16:32 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet(0x2, 0x80001, 0x0) socket$packet(0x11, 0x3, 0x300) socket(0x2, 0x80805, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) epoll_create(0x800) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_generic(0x10, 0x3, 0x10) openat$bsg(0xffffffffffffff9c, &(0x7f0000001980)='/dev/bsg\x00', 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') dup(r0) pipe(&(0x7f0000000100)) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r3, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r3], 0x5c}}, 0x0) 02:16:32 executing program 0: [ 614.008181][ T8486] Bluetooth: hci5: command 0x0406 tx timeout 02:16:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb", 0x14, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:16:32 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x6f, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab840213f2325f1a390101050a012b000000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b", 0x0, 0x100, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x48) 02:16:32 executing program 2: [ 614.161243][T13572] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 02:16:32 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet(0x2, 0x80001, 0x0) socket$packet(0x11, 0x3, 0x300) socket(0x2, 0x80805, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) epoll_create(0x800) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_generic(0x10, 0x3, 0x10) openat$bsg(0xffffffffffffff9c, &(0x7f0000001980)='/dev/bsg\x00', 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') dup(r0) pipe(&(0x7f0000000100)) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r3, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r3], 0x5c}}, 0x0) 02:16:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 614.688666][T13586] EXT4-fs warning (device loop3): ext4_enable_quotas:6165: Failed to enable quota tracking (type=1, err=-22). Please run e2fsck to fix. 02:16:33 executing program 0: [ 614.770615][T13586] EXT4-fs (loop3): mount failed 02:16:33 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xa6, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab840213f2325f1a390101050a012b000000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f3", 0x0, 0x100, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x48) 02:16:33 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet(0x2, 0x80001, 0x0) socket$packet(0x11, 0x3, 0x300) socket(0x2, 0x80805, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) epoll_create(0x800) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_generic(0x10, 0x3, 0x10) openat$bsg(0xffffffffffffff9c, &(0x7f0000001980)='/dev/bsg\x00', 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') dup(r0) pipe(&(0x7f0000000100)) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r3, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r3], 0x5c}}, 0x0) 02:16:33 executing program 2: 02:16:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb", 0x14, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:16:33 executing program 0: [ 615.244202][T13594] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 615.532503][T13606] EXT4-fs warning (device loop3): ext4_enable_quotas:6165: Failed to enable quota tracking (type=1, err=-22). Please run e2fsck to fix. 02:16:34 executing program 0: [ 615.593364][T13606] EXT4-fs (loop3): mount failed 02:16:34 executing program 2: 02:16:34 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet(0x2, 0x80001, 0x0) socket$packet(0x11, 0x3, 0x300) socket(0x2, 0x80805, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) epoll_create(0x800) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_generic(0x10, 0x3, 0x10) openat$bsg(0xffffffffffffff9c, &(0x7f0000001980)='/dev/bsg\x00', 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') dup(r0) pipe(&(0x7f0000000100)) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r3, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r3], 0x5c}}, 0x0) 02:16:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:16:34 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b7000000000000009500000000000000070c24aff3dd52390113c1d182ea4975f20d0f04fe4aa8532b2c73ebcfd94aaf215038ab8a544e216a1b2e015ba85682c863ae8bea15a9cccd6bd08a79905eec98b683e768fd45e60b0ddc022b3286dc342fe525998c0ed79be88ee168dabc5464d78405abfded7cf9ac52f0aeb9da7ef68851de5d21977be1586577ececf06fec86fce036c219f7c62616438a34ae358d65fa4adf1aaaeef6e8a3cfeee362078e98ff0d1cab2b"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xa6, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab840213f2325f1a390101050a012b000000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f3", 0x0, 0x100, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x48) 02:16:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb", 0x14, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:16:34 executing program 0: 02:16:34 executing program 2: 02:16:34 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet(0x2, 0x80001, 0x0) socket$packet(0x11, 0x3, 0x300) socket(0x2, 0x80805, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) epoll_create(0x800) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_generic(0x10, 0x3, 0x10) openat$bsg(0xffffffffffffff9c, &(0x7f0000001980)='/dev/bsg\x00', 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') dup(r0) pipe(&(0x7f0000000100)) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=ANY=[@ANYBLOB="5c000000100001040000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r3, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r3], 0x5c}}, 0x0) 02:16:34 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b7000000000000009500000000000000070c24aff3dd52390113c1d182ea4975f20d0f04fe4aa8532b2c73ebcfd94aaf215038ab8a544e216a1b2e015ba85682c863ae8bea15a9cccd6bd08a79905eec98b683e768fd45e60b0ddc022b3286dc342fe525998c0ed79be88ee168dabc5464d78405abfded7cf9ac52f0aeb9da7ef68851de5d21977be1586577ececf06fec86fce036c219f7c62616438a34ae358d65fa4adf1aaaeef6e8a3cfeee362078e98ff0d1cab2b"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xa6, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab840213f2325f1a390101050a012b000000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f3", 0x0, 0x100, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x48) [ 616.478466][T13621] EXT4-fs warning (device loop3): ext4_enable_quotas:6165: Failed to enable quota tracking (type=1, err=-22). Please run e2fsck to fix. [ 616.515692][T13620] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 616.579108][T13621] EXT4-fs (loop3): mount failed 02:16:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {0x0, 0x0, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:16:35 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:16:35 executing program 0: [ 616.968269][T13633] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.1'. 02:16:35 executing program 2: 02:16:35 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xc2, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab840213f2325f1a390101050a012b000000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb3", 0x0, 0x100, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x48) 02:16:35 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet(0x2, 0x80001, 0x0) socket$packet(0x11, 0x3, 0x300) socket(0x2, 0x80805, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) epoll_create(0x800) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_generic(0x10, 0x3, 0x10) openat$bsg(0xffffffffffffff9c, &(0x7f0000001980)='/dev/bsg\x00', 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') dup(r0) pipe(&(0x7f0000000100)) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=ANY=[@ANYBLOB="5c000000100001040000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r3, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r3], 0x5c}}, 0x0) 02:16:35 executing program 0: [ 617.354181][T13636] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 02:16:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {0x0, 0x0, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 617.632651][T13644] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.1'. 02:16:36 executing program 2: [ 617.840056][T13647] EXT4-fs warning (device loop3): ext4_enable_quotas:6165: Failed to enable quota tracking (type=1, err=-22). Please run e2fsck to fix. 02:16:36 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet(0x2, 0x80001, 0x0) socket$packet(0x11, 0x3, 0x300) socket(0x2, 0x80805, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) epoll_create(0x800) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_generic(0x10, 0x3, 0x10) openat$bsg(0xffffffffffffff9c, &(0x7f0000001980)='/dev/bsg\x00', 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') dup(r0) pipe(&(0x7f0000000100)) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=ANY=[@ANYBLOB="5c000000100001040000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r3, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r3], 0x5c}}, 0x0) [ 617.982183][T13647] EXT4-fs (loop3): mount failed 02:16:36 executing program 0: 02:16:36 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xc2, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab840213f2325f1a390101050a012b000000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb3", 0x0, 0x100, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x48) 02:16:36 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) [ 618.246523][T13655] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 618.381660][T13661] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.1'. 02:16:36 executing program 2: 02:16:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {0x0, 0x0, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:16:37 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, 0xa, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 02:16:37 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000000c0)=""/198, 0x1a, 0xc6, 0x1}, 0x20) 02:16:37 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet(0x2, 0x80001, 0x0) socket$packet(0x11, 0x3, 0x300) socket(0x2, 0x80805, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) epoll_create(0x800) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_generic(0x10, 0x3, 0x10) openat$bsg(0xffffffffffffff9c, &(0x7f0000001980)='/dev/bsg\x00', 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') dup(r0) pipe(&(0x7f0000000100)) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=ANY=[@ANYBLOB="5c0000001000010400000000000000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r3, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r3], 0x5c}}, 0x0) [ 619.060651][T13667] EXT4-fs warning (device loop3): ext4_enable_quotas:6165: Failed to enable quota tracking (type=1, err=-22). Please run e2fsck to fix. [ 619.092509][T13667] EXT4-fs (loop3): mount failed 02:16:37 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xc2, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab840213f2325f1a390101050a012b000000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb3", 0x0, 0x100, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x48) [ 619.220412][T13672] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 02:16:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:16:37 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)={0x44, 0x1, 0x2, 0x101, 0x0, 0x0, {0xa}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}]}]}, 0x44}}, 0x0) [ 619.579397][T13685] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.1'. [ 619.579949][T13682] EXT4-fs warning (device loop3): ext4_enable_quotas:6165: Failed to enable quota tracking (type=1, err=-22). Please run e2fsck to fix. 02:16:38 executing program 2: add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000240)='E', 0x1, 0xfffffffffffffffc) 02:16:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00), 0x0, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 619.729828][T13682] EXT4-fs (loop3): mount failed 02:16:38 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet(0x2, 0x80001, 0x0) socket$packet(0x11, 0x3, 0x300) socket(0x2, 0x80805, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) epoll_create(0x800) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_generic(0x10, 0x3, 0x10) openat$bsg(0xffffffffffffff9c, &(0x7f0000001980)='/dev/bsg\x00', 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') dup(r0) pipe(&(0x7f0000000100)) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=ANY=[@ANYBLOB="5c0000001000010400000000000000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r3, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r3], 0x5c}}, 0x0) 02:16:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:16:38 executing program 0: 02:16:38 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xd0, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab840213f2325f1a390101050a012b000000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401", 0x0, 0x100, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x48) 02:16:38 executing program 2: [ 620.358818][T13702] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.1'. [ 620.382125][T13698] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 02:16:38 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x16, 0x0, 0x1230, 0x3, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x40) 02:16:39 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet(0x2, 0x80001, 0x0) socket$packet(0x11, 0x3, 0x300) socket(0x2, 0x80805, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) epoll_create(0x800) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_generic(0x10, 0x3, 0x10) openat$bsg(0xffffffffffffff9c, &(0x7f0000001980)='/dev/bsg\x00', 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') dup(r0) pipe(&(0x7f0000000100)) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=ANY=[@ANYBLOB="5c0000001000010400000000000000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r3, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r3], 0x5c}}, 0x0) 02:16:39 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4}, 0x40) 02:16:39 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) io_setup(0x1f, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x2, 0x0, 0x0, r0, 0x0}]) 02:16:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00), 0x0, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 620.873608][T13710] EXT4-fs error (device loop3): ext4_quota_enable:6125: comm syz-executor.3: Bad quota inode # 4 [ 620.964886][T13710] EXT4-fs warning (device loop3): ext4_enable_quotas:6165: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. 02:16:39 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xd0, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab840213f2325f1a390101050a012b000000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401", 0x0, 0x100, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x48) [ 621.029724][T13710] EXT4-fs (loop3): mount failed [ 621.101693][T13715] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.1'. 02:16:39 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet(0x2, 0x80001, 0x0) socket$packet(0x11, 0x3, 0x300) socket(0x2, 0x80805, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) epoll_create(0x800) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_generic(0x10, 0x3, 0x10) openat$bsg(0xffffffffffffff9c, &(0x7f0000001980)='/dev/bsg\x00', 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') dup(r0) pipe(&(0x7f0000000100)) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=ANY=[@ANYBLOB="5c000000100001040000000000000000510e", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r3, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r3], 0x5c}}, 0x0) 02:16:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:16:39 executing program 2: r0 = epoll_create(0x10001) r1 = epoll_create(0xffff) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) 02:16:40 executing program 0: r0 = openat$kvm(0xffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x145) [ 621.638042][T13726] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 621.648880][T13730] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.1'. 02:16:40 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x5, 0x6, 0x801}, 0x14}}, 0x0) 02:16:40 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xd0, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab840213f2325f1a390101050a012b000000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401", 0x0, 0x100, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x48) 02:16:40 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet(0x2, 0x80001, 0x0) socket$packet(0x11, 0x3, 0x300) socket(0x2, 0x80805, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) epoll_create(0x800) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_generic(0x10, 0x3, 0x10) openat$bsg(0xffffffffffffff9c, &(0x7f0000001980)='/dev/bsg\x00', 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') dup(r0) pipe(&(0x7f0000000100)) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=ANY=[@ANYBLOB="5c000000100001040000000000000000510e", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r3, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r3], 0x5c}}, 0x0) 02:16:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00), 0x0, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 622.333962][T13738] EXT4-fs error (device loop3): ext4_quota_enable:6125: comm syz-executor.3: Bad quota inode # 4 [ 622.347970][T13743] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.1'. [ 622.367737][T13738] EXT4-fs warning (device loop3): ext4_enable_quotas:6165: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 622.512754][T13738] EXT4-fs (loop3): mount failed 02:16:41 executing program 2: syz_open_procfs(0x0, &(0x7f0000000500)='smaps\x00') 02:16:41 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet(0x2, 0x80001, 0x0) socket$packet(0x11, 0x3, 0x300) socket(0x2, 0x80805, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) epoll_create(0x800) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_generic(0x10, 0x3, 0x10) openat$bsg(0xffffffffffffff9c, &(0x7f0000001980)='/dev/bsg\x00', 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') dup(r0) pipe(&(0x7f0000000100)) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=ANY=[@ANYBLOB="5c000000100001040000000000000000510e", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r3, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r3], 0x5c}}, 0x0) 02:16:41 executing program 0: prctl$PR_GET_TID_ADDRESS(0x67, &(0x7f0000001240)) 02:16:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:16:41 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xd7, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab840213f2325f1a390101050a012b000000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deab", 0x0, 0x100, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x48) [ 623.070944][T13751] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 02:16:41 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0x1267, &(0x7f0000000300)) [ 623.213658][T13758] EXT4-fs error (device loop3): ext4_quota_enable:6125: comm syz-executor.3: Bad quota inode # 4 [ 623.266800][T13764] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.1'. [ 623.297738][T13758] EXT4-fs warning (device loop3): ext4_enable_quotas:6165: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. 02:16:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)=' \x00'/11, 0xb, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 623.420065][T13758] EXT4-fs (loop3): mount failed 02:16:41 executing program 0: timer_create(0x3, &(0x7f000049efa0)={0x0, 0xb}, &(0x7f0000044000)) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) read(r0, &(0x7f0000000740)=""/384, 0x200008c0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xb0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0xffffffffffffffff, &(0x7f0000000080)={{0x77359400}, {0x0, 0x9}}, 0x0) write$FUSE_IOCTL(r0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)) read(0xffffffffffffffff, 0x0, 0x6c00) ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x7f, 0x6, @remote}, 0x14) 02:16:42 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet(0x2, 0x80001, 0x0) socket$packet(0x11, 0x3, 0x300) socket(0x2, 0x80805, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) epoll_create(0x800) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_generic(0x10, 0x3, 0x10) openat$bsg(0xffffffffffffff9c, &(0x7f0000001980)='/dev/bsg\x00', 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') dup(r0) pipe(&(0x7f0000000100)) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=ANY=[@ANYBLOB="5c000000100001040000000000000000510ebe", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r3, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r3], 0x5c}}, 0x0) 02:16:42 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xd7, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab840213f2325f1a390101050a012b000000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deab", 0x0, 0x100, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x48) 02:16:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {0x0, 0x0, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:16:42 executing program 2: r0 = openat$tun(0xffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x894c, 0x0) [ 623.865877][T13772] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 623.985049][T13780] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.1'. 02:16:42 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet(0x2, 0x80001, 0x0) socket$packet(0x11, 0x3, 0x300) socket(0x2, 0x80805, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) epoll_create(0x800) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_generic(0x10, 0x3, 0x10) openat$bsg(0xffffffffffffff9c, &(0x7f0000001980)='/dev/bsg\x00', 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') dup(r0) pipe(&(0x7f0000000100)) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=ANY=[@ANYBLOB="5c000000100001040000000000000000510ebe", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r3, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r3], 0x5c}}, 0x0) 02:16:42 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@fat=@dmask={'dmask'}}, {@fat=@gid={'gid'}}]}) 02:16:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)=' \x00'/11, 0xb, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:16:42 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xd7, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab840213f2325f1a390101050a012b000000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deab", 0x0, 0x100, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x48) [ 624.360760][T13788] EXT4-fs error (device loop3): ext4_quota_enable:6125: comm syz-executor.3: Bad quota inode # 4 [ 624.407981][T13788] EXT4-fs warning (device loop3): ext4_enable_quotas:6165: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. 02:16:42 executing program 2: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) getsockopt$netlink(r0, 0x10e, 0xa, 0x0, &(0x7f0000006c00)) [ 624.547604][T13788] EXT4-fs (loop3): mount failed [ 624.605930][T13793] FAT-fs (loop0): bogus number of reserved sectors [ 624.612616][T13793] FAT-fs (loop0): Can't find a valid FAT filesystem [ 624.709895][T13793] FAT-fs (loop0): bogus number of reserved sectors [ 624.717084][T13793] FAT-fs (loop0): Can't find a valid FAT filesystem 02:16:43 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000002580)={0x0, 0x0, &(0x7f0000002540)={&(0x7f00000025c0)=ANY=[@ANYBLOB="dc240000030101"], 0x24dc}}, 0x0) 02:16:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {0x0, 0x0, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) [ 624.971208][T13805] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.1'. 02:16:43 executing program 0: prctl$PR_SET_SECUREBITS(0x1c, 0x3) prctl$PR_GET_SECUREBITS(0x1b) [ 625.101434][T13806] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 625.135956][T13811] netlink: 9416 bytes leftover after parsing attributes in process `syz-executor.2'. 02:16:43 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xda, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab840213f2325f1a390101050a012b000000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4", 0x0, 0x100, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x48) 02:16:43 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet(0x2, 0x80001, 0x0) socket$packet(0x11, 0x3, 0x300) socket(0x2, 0x80805, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) epoll_create(0x800) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_generic(0x10, 0x3, 0x10) openat$bsg(0xffffffffffffff9c, &(0x7f0000001980)='/dev/bsg\x00', 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') dup(r0) pipe(&(0x7f0000000100)) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=ANY=[@ANYBLOB="5c000000100001040000000000000000510ebe", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r3, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r3], 0x5c}}, 0x0) 02:16:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)=' \x00'/11, 0xb, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:16:43 executing program 2: bpf$LINK_GET_FD_BY_ID(0x18, 0x0, 0x0) 02:16:44 executing program 2: syz_open_procfs(0x0, &(0x7f0000000040)='environ\x00') [ 625.571121][T13815] EXT4-fs error (device loop3): ext4_quota_enable:6125: comm syz-executor.3: Bad quota inode # 4 [ 625.697020][T13815] EXT4-fs warning (device loop3): ext4_enable_quotas:6165: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 625.752918][T13815] EXT4-fs (loop3): mount failed 02:16:44 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000040)="640f21f3f20f2b2b26d9784a0f01c3d93926670fa80f3266b83d0000000f23280f21f86635000000040f23f826df1dbaa10066b8ef8dc56d66ef", 0x3a}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000100)={0xa0003}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40010c00004cf], 0x17001}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:16:44 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000001040)={&(0x7f0000000f40)={0x10}, 0x10}}, 0x0) [ 625.987046][T13828] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.1'. 02:16:44 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b7000000000000009500000000000000070c24aff3dd52390113c1d182ea4975f20d0f04fe4aa8532b2c73ebcfd94aaf215038ab8a544e216a1b2e015ba85682c863ae8bea15a9cccd6bd08a79905eec98b683e768fd45e60b0ddc022b3286dc342fe525998c0ed79be88ee168dabc5464d78405abfded7cf9ac52f0aeb9da7ef68851de5d21977be1586577ececf06fec86fce036c219f7c62616438a34ae358d65fa4adf1aaaeef6e8a3cfeee362078e98ff0d1cab2b"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xda, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab840213f2325f1a390101050a012b000000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4", 0x0, 0x100, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x48) 02:16:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {0x0, 0x0, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) [ 626.204321][T13830] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 02:16:44 executing program 1: prctl$PR_GET_TID_ADDRESS(0x21, 0x0) 02:16:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041", 0x10, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:16:45 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x15, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) [ 626.720462][T13843] EXT4-fs error (device loop3): ext4_quota_enable:6125: comm syz-executor.3: Bad quota inode # 4 [ 626.879641][T13843] EXT4-fs warning (device loop3): ext4_enable_quotas:6165: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. 02:16:45 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x16, 0x0, 0x1e, 0x3}, 0x40) 02:16:45 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0xa7000d0c) [ 627.058860][T13843] EXT4-fs (loop3): mount failed 02:16:45 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b7000000000000009500000000000000070c24aff3dd52390113c1d182ea4975f20d0f04fe4aa8532b2c73ebcfd94aaf215038ab8a544e216a1b2e015ba85682c863ae8bea15a9cccd6bd08a79905eec98b683e768fd45e60b0ddc022b3286dc342fe525998c0ed79be88ee168dabc5464d78405abfded7cf9ac52f0aeb9da7ef68851de5d21977be1586577ececf06fec86fce036c219f7c62616438a34ae358d65fa4adf1aaaeef6e8a3cfeee362078e98ff0d1cab2b"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xda, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab840213f2325f1a390101050a012b000000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4", 0x0, 0x100, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x48) 02:16:45 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000040)="640f21f3f20f2b2b26d9784a0f01c3d93926670fa80f3266b83d0000000f23280f21f86635000000040f23f826df1dbaa10066b8ef8dc56d66ef", 0x3a}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000100)={0xa0003}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40010c00004cf], 0x17001}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:16:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00), 0x0, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) [ 627.436107][T13862] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 02:16:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041", 0x10, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:16:46 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x1}]}}, &(0x7f0000001640)=""/162, 0x26, 0xa2, 0x1}, 0x20) 02:16:46 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x1c, 0x1, 0x1, 0x301, 0x0, 0x0, {}, [@CTA_MARK={0x8}]}, 0x1c}}, 0x0) 02:16:46 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xdc, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab840213f2325f1a390101050a012b000000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e6", 0x0, 0x100, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x48) 02:16:46 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000040)="640f21f3f20f2b2b26d9784a0f01c3d93926670fa80f3266b83d0000000f23280f21f86635000000040f23f826df1dbaa10066b8ef8dc56d66ef", 0x3a}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000100)={0xa0003}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40010c00004cf], 0x17001}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 628.202863][T13878] EXT4-fs error (device loop3): ext4_quota_enable:6125: comm syz-executor.3: Bad quota inode # 4 [ 628.302095][T13878] EXT4-fs warning (device loop3): ext4_enable_quotas:6165: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 628.397887][T13878] EXT4-fs (loop3): mount failed [ 628.686302][T13892] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 02:16:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00), 0x0, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:16:47 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000040)="640f21f3f20f2b2b26d9784a0f01c3d93926670fa80f3266b83d0000000f23280f21f86635000000040f23f826df1dbaa10066b8ef8dc56d66ef", 0x3a}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000100)={0xa0003}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40010c00004cf], 0x17001}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:16:47 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xe, 0x0, 0x0, 0x1}, 0x40) 02:16:47 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b7000000000000009500000000000000070c24aff3dd52390113c1d182ea4975f20d0f04fe4aa8532b2c73ebcfd94aaf215038ab8a544e216a1b2e015ba85682c863ae8bea15a9cccd6bd08a79905eec98b683e768fd45e60b0ddc022b3286dc342fe525998c0ed79be88ee168dabc5464d78405abfded7cf9ac52f0aeb9da7ef68851de5d21977be1586577ececf06fec86fce036c219f7c62616438a34ae358d65fa4adf1aaaeef6e8a3cfeee362078e98ff0d1cab2b"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xdc, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab840213f2325f1a390101050a012b000000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e6", 0x0, 0x100, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x48) 02:16:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041", 0x10, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:16:47 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pipe(&(0x7f00000001c0)) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000100)={0x1d8001}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40010c00004cf], 0x17001}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:16:47 executing program 2: add_key$user(0x0, 0x0, &(0x7f0000000200)='U', 0x1, 0xfffffffffffffffc) prctl$PR_GET_TID_ADDRESS(0x19, &(0x7f0000001240)) [ 629.245763][T13907] EXT4-fs error (device loop3): ext4_quota_enable:6125: comm syz-executor.3: Bad quota inode # 4 [ 629.258037][T13907] EXT4-fs warning (device loop3): ext4_enable_quotas:6165: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 629.283764][T13907] EXT4-fs (loop3): mount failed 02:16:47 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000040)="640f21f3f20f2b2b26d9784a0f01c3d93926670fa80f3266b83d0000000f23280f21f86635000000040f23f826df1dbaa10066b8ef8dc56d66ef", 0x3a}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000100)={0xa0003}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:16:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00), 0x0, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) [ 629.871356][T13926] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 02:16:48 executing program 2: prctl$PR_GET_TID_ADDRESS(0x1c, &(0x7f0000001240)) 02:16:48 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xdc, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab840213f2325f1a390101050a012b000000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e6", 0x0, 0x100, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x48) 02:16:48 executing program 1: request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='}@\\.+@\x00', 0xfffffffffffffffe) [ 630.146200][T13936] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. 02:16:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840", 0x13, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 630.252159][T13940] EXT4-fs error (device loop3): ext4_quota_enable:6125: comm syz-executor.3: Bad quota inode # 4 [ 630.324133][T13940] EXT4-fs warning (device loop3): ext4_enable_quotas:6165: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 630.396631][T13940] EXT4-fs (loop3): mount failed 02:16:48 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000040)="640f21f3f20f2b2b26d9784a0f01c3d93926670fa80f3266b83d0000000f23280f21f86635000000040f23f826df1dbaa10066b8ef8dc56d66ef", 0x3a}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000100)={0xa0003}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:16:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4", 0xe, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:16:49 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@nat={'nat\x00', 0x1b, 0x5, 0x470, 0x0, 0x1d0, 0xffffffff, 0x0, 0x0, 0x444, 0x444, 0xffffffff, 0x444, 0x444, 0x5, 0x0, {[{{@ipv6={@mcast1, @private1, [], [], 'ip6gretap0\x00', 'geneve1\x00', {}, {}, 0x0, 0x0, 0xb}, 0x0, 0xa4, 0xe4}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "92881df12bf7d1d36d64af6a68498d591b899df4aaec0bd5b89daedf1bca"}}}, {{@uncond, 0x0, 0xa4, 0xec}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@remote, @ipv6=@ipv4={[], [], @empty}, @icmp_id}}}, {{@uncond, 0x0, 0xa4, 0xec}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4, @ipv6=@empty, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa4, 0xec}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@mcast2, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @gre_key, @icmp_id}}}], {{[], 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x4cc) [ 631.117064][T13958] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 02:16:49 executing program 2: socket(0x2, 0x3, 0x224f) 02:16:49 executing program 1: r0 = timerfd_create(0x8, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000000)={{0x0, 0x3938700}, {0x77359400}}, 0x0) 02:16:49 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b7000000000000009500000000000000070c24aff3dd52390113c1d182ea4975f20d0f04fe4aa8532b2c73ebcfd94aaf215038ab8a544e216a1b2e015ba85682c863ae8bea15a9cccd6bd08a79905eec98b683e768fd45e60b0ddc022b3286dc342fe525998c0ed79be88ee168dabc5464d78405abfded7cf9ac52f0aeb9da7ef68851de5d21977be1586577ececf06fec86fce036c219f7c62616438a34ae358d65fa4adf1aaaeef6e8a3cfeee362078e98ff0d1cab2b"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xdd, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab840213f2325f1a390101050a012b000000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x48) 02:16:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840", 0x13, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:16:49 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000040)="640f21f3f20f2b2b26d9784a0f01c3d93926670fa80f3266b83d0000000f23280f21f86635000000040f23f826df1dbaa10066b8ef8dc56d66ef", 0x3a}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000100)={0xa0003}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 631.451036][T13969] EXT4-fs error (device loop3): ext4_quota_enable:6125: comm syz-executor.3: Bad quota inode # 4 [ 631.506138][T13969] EXT4-fs warning (device loop3): ext4_enable_quotas:6165: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 631.672371][T13969] EXT4-fs (loop3): mount failed 02:16:50 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xdd, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab840213f2325f1a390101050a012b000000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x48) 02:16:50 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0x801012ee, 0x0) [ 631.926807][T13982] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. 02:16:50 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x16, 0x2, 0x0, 0x3}, 0x40) 02:16:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4", 0xe, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) [ 632.065546][T13986] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 02:16:50 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x14, 0x2, 0x2, 0x201}, 0x14}}, 0x0) 02:16:50 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000040)="640f21f3f20f2b2b26d9784a0f01c3d93926670fa80f3266b83d0000000f23280f21f86635000000040f23f826df1dbaa10066b8ef8dc56d66ef", 0x3a}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40010c00004cf], 0x17001}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:16:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840", 0x13, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:16:50 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xdd, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab840213f2325f1a390101050a012b000000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x48) 02:16:51 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080)='ethtool\x00') recvmmsg(r0, &(0x7f0000001040)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000001100)={0x28, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_PAUSE_AUTONEG={0x5}, @ETHTOOL_A_PAUSE_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x28}}, 0x0) [ 632.715454][T13999] EXT4-fs error (device loop3): ext4_quota_enable:6125: comm syz-executor.3: Bad quota inode # 4 [ 632.728975][T13999] EXT4-fs warning (device loop3): ext4_enable_quotas:6165: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 632.751202][T13999] EXT4-fs (loop3): mount failed 02:16:51 executing program 2: syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0xfffff019, 0x4040) 02:16:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4", 0xe, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) [ 633.174254][T14013] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 02:16:51 executing program 1: prctl$PR_GET_TID_ADDRESS(0x17, 0x0) 02:16:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb", 0x14, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:16:51 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b7000000000000009500000000000000070c24aff3dd52390113c1d182ea4975f20d0f04fe4aa8532b2c73ebcfd94aaf215038ab8a544e216a1b2e015ba85682c863ae8bea15a9cccd6bd08a79905eec98b683e768fd45e60b0ddc022b3286dc342fe525998c0ed79be88ee168dabc5464d78405abfded7cf9ac52f0aeb9da7ef68851de5d21977be1586577ececf06fec86fce036c219f7c62616438a34ae358d65fa4adf1aaaeef6e8a3cfeee362078e98ff0d1cab2b"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xdd, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab840213f2325f1a390101050a012b000000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)}, 0x48) 02:16:51 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000040)="640f21f3f20f2b2b26d9784a0f01c3d93926670fa80f3266b83d0000000f23280f21f86635000000040f23f826df1dbaa10066b8ef8dc56d66ef", 0x3a}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40010c00004cf], 0x17001}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 633.703985][T14025] EXT4-fs error (device loop3): ext4_quota_enable:6125: comm syz-executor.3: Bad quota inode # 4 02:16:52 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000001800)={'sit0\x00', 0x0}) [ 633.819386][T14025] EXT4-fs warning (device loop3): ext4_enable_quotas:6165: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 633.960017][T14025] EXT4-fs (loop3): mount failed 02:16:52 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0x800812a0, &(0x7f0000000300)) 02:16:52 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000040)="640f21f3f20f2b2b26d9784a0f01c3d93926670fa80f3266b83d0000000f23280f21f86635000000040f23f826df1dbaa10066b8ef8dc56d66ef", 0x3a}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40010c00004cf], 0x17001}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 634.195535][T14042] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 02:16:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb", 0x14, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:16:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00", 0x15, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:16:53 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xdd, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab840213f2325f1a390101050a012b000000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)}, 0x48) 02:16:53 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0x1279, &(0x7f0000000300)) [ 634.740567][T14053] EXT4-fs error (device loop3): ext4_quota_enable:6125: comm syz-executor.3: Bad quota inode # 4 [ 634.811308][T14053] EXT4-fs warning (device loop3): ext4_enable_quotas:6165: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. 02:16:53 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000040)="640f21f3f20f2b2b26d9784a0f01c3d93926670fa80f3266b83d0000000f23280f21f86635000000040f23f826df1dbaa10066b8ef8dc56d66ef", 0x3a}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000100)={0xa0003}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40010c00004cf], 0x17001}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:16:53 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000040)='tmpfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x10401, &(0x7f0000000380)={[{@nr_blocks={'nr_blocks', 0x3d, [0x0]}}, {@gid={'gid', 0x3d, 0xee01}}]}) [ 634.953368][T14053] EXT4-fs (loop3): mount failed [ 634.989590][T14058] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 02:16:53 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xdd, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab840213f2325f1a390101050a012b000000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)}, 0x48) 02:16:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00", 0x15, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:16:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb", 0x14, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:16:53 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000040)="640f21f3f20f2b2b26d9784a0f01c3d93926670fa80f3266b83d0000000f23280f21f86635000000040f23f826df1dbaa10066b8ef8dc56d66ef", 0x3a}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000100)={0xa0003}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40010c00004cf], 0x17001}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:16:53 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x18, 0x4, &(0x7f00000001c0)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) [ 635.530436][T14075] tmpfs: Bad value for 'nr_blocks' 02:16:53 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b7000000000000009500000000000000070c24aff3dd52390113c1d182ea4975f20d0f04fe4aa8532b2c73ebcfd94aaf215038ab8a544e216a1b2e015ba85682c863ae8bea15a9cccd6bd08a79905eec98b683e768fd45e60b0ddc022b3286dc342fe525998c0ed79be88ee168dabc5464d78405abfded7cf9ac52f0aeb9da7ef68851de5d21977be1586577ececf06fec86fce036c219f7c62616438a34ae358d65fa4adf1aaaeef6e8a3cfeee362078e98ff0d1cab2b"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xdd, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab840213f2325f1a390101050a012b000000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x48) [ 635.685089][T14075] tmpfs: Bad value for 'nr_blocks' [ 635.836124][T14079] EXT4-fs error (device loop3): ext4_quota_enable:6125: comm syz-executor.3: Bad quota inode # 4 02:16:54 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000040)="640f21f3f20f2b2b26d9784a0f01c3d93926670fa80f3266b83d0000000f23280f21f86635000000040f23f826df1dbaa10066b8ef8dc56d66ef", 0x3a}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000100)={0xa0003}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40010c00004cf], 0x17001}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 635.928820][T14086] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 635.941165][T14079] EXT4-fs warning (device loop3): ext4_enable_quotas:6165: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 635.966073][T14079] EXT4-fs (loop3): mount failed 02:16:54 executing program 1: r0 = syz_io_uring_setup(0x7f77, &(0x7f0000000040), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000100)) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f00000001c0), 0x1) 02:16:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:16:54 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xdd, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab840213f2325f1a390101050a012b000000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x48) 02:16:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00", 0x15, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:16:54 executing program 2: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000040)={{0x0, 0x3938700}, {0x77359400}}, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000000)={{0x0, 0x3938700}, {0x77359400}}, 0x0) 02:16:55 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000040)="640f21f3f20f2b2b26d9784a0f01c3d93926670fa80f3266b83d0000000f23280f21f86635000000040f23f826df1dbaa10066b8ef8dc56d66ef", 0x3a}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_GUEST_DEBUG(0xffffffffffffffff, 0x4048ae9b, &(0x7f0000000100)={0xa0003}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40010c00004cf], 0x17001}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 02:16:55 executing program 2: bpf$LINK_GET_FD_BY_ID(0x21, 0x0, 0x0) [ 636.828684][T14123] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 636.895376][T14124] EXT4-fs error (device loop3): ext4_quota_enable:6125: comm syz-executor.3: Bad quota inode # 4 [ 636.980184][T14124] EXT4-fs warning (device loop3): ext4_enable_quotas:6165: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 637.027382][T14124] EXT4-fs (loop3): mount failed 02:16:55 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b7000000000000009500000000000000070c24aff3dd52390113c1d182ea4975f20d0f04fe4aa8532b2c73ebcfd94aaf215038ab8a544e216a1b2e015ba85682c863ae8bea15a9cccd6bd08a79905eec98b683e768fd45e60b0ddc022b3286dc342fe525998c0ed79be88ee168dabc5464d78405abfded7cf9ac52f0aeb9da7ef68851de5d21977be1586577ececf06fec86fce036c219f7c62616438a34ae358d65fa4adf1aaaeef6e8a3cfeee362078e98ff0d1cab2b"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xdd, 0x0, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab840213f2325f1a390101050a012b000000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x48) 02:16:55 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0x1261, 0x0) 02:16:55 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000001700)=[{{&(0x7f0000000080)={0xa, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000000100)=[@hoplimit_2292={{0x10}}, @tclass={{0x10}}], 0x20}}], 0x1, 0x0) 02:16:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:16:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000", 0x18, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:16:55 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000040)="640f21f3f20f2b2b26d9784a0f01c3d93926670fa80f3266b83d0000000f23280f21f86635000000040f23f826df1dbaa10066b8ef8dc56d66ef", 0x3a}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_GUEST_DEBUG(0xffffffffffffffff, 0x4048ae9b, &(0x7f0000000100)={0xa0003}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40010c00004cf], 0x17001}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 02:16:56 executing program 1: prctl$PR_GET_TID_ADDRESS(0x8, &(0x7f0000001240)) 02:16:56 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0x127b, &(0x7f0000000300)) 02:16:56 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0x12fb, 0x0) [ 637.956861][T14152] EXT4-fs error (device loop3): ext4_quota_enable:6125: comm syz-executor.3: Bad quota inode # 4 [ 637.996193][T14152] EXT4-fs warning (device loop3): ext4_enable_quotas:6165: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 637.996444][T14151] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 638.056721][T14152] EXT4-fs (loop3): mount failed 02:16:56 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000040)="640f21f3f20f2b2b26d9784a0f01c3d93926670fa80f3266b83d0000000f23280f21f86635000000040f23f826df1dbaa10066b8ef8dc56d66ef", 0x3a}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_GUEST_DEBUG(0xffffffffffffffff, 0x4048ae9b, &(0x7f0000000100)={0xa0003}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40010c00004cf], 0x17001}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 02:16:56 executing program 4: prctl$PR_GET_TID_ADDRESS(0x1e, 0x0) 02:16:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000", 0x18, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:16:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:16:57 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0x302, 0x0) 02:16:57 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='personality\x00') syz_io_uring_setup(0x7c2a, &(0x7f0000000000)={0x0, 0x0, 0x20, 0x0, 0x0, 0x0, r0}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) 02:16:57 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x28, 0x7, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x28}}, 0x0) [ 639.099343][T14179] EXT4-fs error (device loop3): ext4_quota_enable:6125: comm syz-executor.3: Bad quota inode # 4 02:16:57 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000100)={0xa0003}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40010c00004cf], 0x17001}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 639.153445][T14179] EXT4-fs warning (device loop3): ext4_enable_quotas:6165: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 639.168078][T14184] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 639.213059][T14179] EXT4-fs (loop3): mount failed 02:16:57 executing program 1: r0 = socket(0x28, 0x801, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000200)={&(0x7f0000000000), 0xc, &(0x7f00000001c0)={0x0, 0x15c}}, 0x0) 02:16:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000", 0x18, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:16:57 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)=0x2) read(r1, 0x0, 0x6c00) dup3(r1, r0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) 02:16:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:16:58 executing program 4: bpf$BPF_BTF_LOAD(0x2, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) 02:16:58 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000100)={0xa0003}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40010c00004cf], 0x17001}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 640.211861][T14209] EXT4-fs error (device loop5): ext4_quota_enable:6125: comm syz-executor.5: Bad quota inode # 4 [ 640.230204][T14210] EXT4-fs error (device loop3): ext4_quota_enable:6125: comm syz-executor.3: Bad quota inode # 4 [ 640.243430][T14209] EXT4-fs warning (device loop5): ext4_enable_quotas:6165: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 640.288453][T14209] EXT4-fs (loop5): mount failed 02:16:58 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000001700)=[{{&(0x7f0000000080)={0xa, 0x4e23, 0x0, @dev}, 0x1c, &(0x7f00000000c0)=[{&(0x7f00000001c0)='c', 0x1}], 0x1, &(0x7f0000000100)=[@hoplimit_2292={{0x10}}, @tclass={{0x10}}], 0x20}}], 0x1, 0x0) 02:16:58 executing program 4: r0 = socket(0x1, 0x5, 0x0) getpeername$packet(r0, 0x0, 0x0) [ 640.364070][T14210] EXT4-fs warning (device loop3): ext4_enable_quotas:6165: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 640.457862][T14210] EXT4-fs (loop3): mount failed 02:16:59 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x63, 0xd, 0x2, [@datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], 'r'}]}}, &(0x7f00000000c0)=""/198, 0x2a, 0xc6, 0x1}, 0x20) 02:16:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:16:59 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000100)={0xa0003}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40010c00004cf], 0x17001}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:16:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f000000000000", 0x1a, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:16:59 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000010c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x0) [ 641.126919][T14233] EXT4-fs error (device loop5): ext4_quota_enable:6125: comm syz-executor.5: Bad quota inode # 4 02:16:59 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYNAME(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, 0xe, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 02:16:59 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000040)="640f21f3f20f2b2b26d9784a0f01c3d93926670fa80f3266b83d0000000f23280f21f86635000000040f23f826df1dbaa10066b8ef8dc56d66ef", 0x3a}], 0x1, 0x0, 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_GUEST_DEBUG(r0, 0x4048ae9b, &(0x7f0000000100)={0xa0003}) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40010c00004cf], 0x17001}) ioctl$KVM_RUN(r0, 0xae80, 0x0) [ 641.241527][T14233] EXT4-fs warning (device loop5): ext4_enable_quotas:6165: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 641.294413][T14241] EXT4-fs error (device loop3): ext4_quota_enable:6125: comm syz-executor.3: Bad quota inode # 4 [ 641.306382][T14241] EXT4-fs warning (device loop3): ext4_enable_quotas:6165: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 641.328326][T14241] EXT4-fs (loop3): mount failed [ 641.437793][T14233] EXT4-fs (loop5): mount failed 02:16:59 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/rt_cache\x00') write$cgroup_int(r0, 0x0, 0x0) 02:17:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f000000000000", 0x1a, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:17:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:17:00 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00'}) syz_genetlink_get_family_id$batadv(0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000200)=0x2) read(r2, 0x0, 0x6c00) dup3(r2, r1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x6c00) 02:17:00 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000040)="640f21f3f20f2b2b26d9784a0f01c3d93926670fa80f3266b83d0000000f23280f21f86635000000040f23f826df1dbaa10066b8ef8dc56d66ef", 0x3a}], 0x1, 0x0, 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_GUEST_DEBUG(r0, 0x4048ae9b, &(0x7f0000000100)={0xa0003}) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40010c00004cf], 0x17001}) ioctl$KVM_RUN(r0, 0xae80, 0x0) 02:17:00 executing program 4: perf_event_open(&(0x7f0000000800)={0x2, 0x70, 0xba, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 642.184913][T14256] EXT4-fs error (device loop3): ext4_quota_enable:6125: comm syz-executor.3: Bad quota inode # 4 [ 642.200220][T14256] EXT4-fs warning (device loop3): ext4_enable_quotas:6165: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 642.366723][T14258] EXT4-fs error (device loop5): ext4_quota_enable:6125: comm syz-executor.5: Bad quota inode # 4 [ 642.399203][T14256] EXT4-fs (loop3): mount failed 02:17:00 executing program 2: perf_event_open(&(0x7f0000000800)={0x2, 0x70, 0xba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:17:00 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000040)="640f21f3f20f2b2b26d9784a0f01c3d93926670fa80f3266b83d0000000f23280f21f86635000000040f23f826df1dbaa10066b8ef8dc56d66ef", 0x3a}], 0x1, 0x0, 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_GUEST_DEBUG(r0, 0x4048ae9b, &(0x7f0000000100)={0xa0003}) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40010c00004cf], 0x17001}) ioctl$KVM_RUN(r0, 0xae80, 0x0) [ 642.518379][T14267] serio: Serial port pts0 [ 642.527435][T14258] EXT4-fs warning (device loop5): ext4_enable_quotas:6165: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 642.547107][T14258] EXT4-fs (loop5): mount failed 02:17:01 executing program 4: modify_ldt$write(0x1, &(0x7f0000000580)={0x86d}, 0x10) 02:17:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f000000000000", 0x1a, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:17:01 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER(r0, &(0x7f0000001200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000011c0)={&(0x7f0000000180)={0xec4, 0x3ed, 0x0, 0x0, 0x0, "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"}, 0xec4}}, 0x0) 02:17:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {0x0, 0x0, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:17:01 executing program 0: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000040)="640f21f3f20f2b2b26d9784a0f01c3d93926670fa80f3266b83d0000000f23280f21f86635000000040f23f826df1dbaa10066b8ef8dc56d66ef", 0x3a}], 0x1, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_GUEST_DEBUG(r1, 0x4048ae9b, &(0x7f0000000100)={0xa0003}) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40010c00004cf], 0x17001}) ioctl$KVM_RUN(r1, 0xae80, 0x0) 02:17:01 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001280)={0x11, 0x4, &(0x7f0000000040)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) [ 643.427341][T14287] EXT4-fs error (device loop3): ext4_quota_enable:6125: comm syz-executor.3: Bad quota inode # 4 [ 643.603865][T14290] EXT4-fs error (device loop5): ext4_quota_enable:6125: comm syz-executor.5: Bad quota inode # 4 [ 643.619813][T14287] EXT4-fs warning (device loop3): ext4_enable_quotas:6165: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. 02:17:02 executing program 4: r0 = syz_io_uring_setup(0x87, &(0x7f0000000180), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) r3 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r4 = dup(r3) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_CLOSE={0x13, 0x0, 0x0, r4}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) 02:17:02 executing program 1: r0 = openat$rtc(0xffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x10, 0x0, 0x7fffffff}) [ 643.720207][T14290] EXT4-fs warning (device loop5): ext4_enable_quotas:6165: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 643.767681][T14287] EXT4-fs (loop3): mount failed [ 643.813977][T14290] EXT4-fs (loop5): mount failed 02:17:02 executing program 0: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000040)="640f21f3f20f2b2b26d9784a0f01c3d93926670fa80f3266b83d0000000f23280f21f86635000000040f23f826df1dbaa10066b8ef8dc56d66ef", 0x3a}], 0x1, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_GUEST_DEBUG(r1, 0x4048ae9b, &(0x7f0000000100)={0xa0003}) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40010c00004cf], 0x17001}) ioctl$KVM_RUN(r1, 0xae80, 0x0) 02:17:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:17:02 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0x5421, &(0x7f0000000300)) 02:17:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {0x0, 0x0, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:17:02 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000000580)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10000, &(0x7f0000001600)) 02:17:03 executing program 4: prctl$PR_GET_TID_ADDRESS(0x29, &(0x7f0000001240)) 02:17:03 executing program 0: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000040)="640f21f3f20f2b2b26d9784a0f01c3d93926670fa80f3266b83d0000000f23280f21f86635000000040f23f826df1dbaa10066b8ef8dc56d66ef", 0x3a}], 0x1, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_GUEST_DEBUG(r1, 0x4048ae9b, &(0x7f0000000100)={0xa0003}) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40010c00004cf], 0x17001}) ioctl$KVM_RUN(r1, 0xae80, 0x0) 02:17:03 executing program 2: mmap(&(0x7f0000600000/0x3000)=nil, 0x3000, 0x0, 0x400000000005e831, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r1 = openat$bsg(0xffffff9c, 0x0, 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000b40)=ANY=[], 0x68) ppoll(0x0, 0x0, &(0x7f00000002c0)={0x77359400}, &(0x7f0000000300)={[0x0, 0x2]}, 0x8) shutdown(r1, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000602000/0x2000)=nil, &(0x7f0000603000/0x3000)=nil, &(0x7f0000602000/0x4000)=nil, &(0x7f0000605000/0x1000)=nil, &(0x7f0000601000/0x1000)=nil, &(0x7f0000610000/0x2000)=nil, &(0x7f000060a000/0x2000)=nil, &(0x7f0000601000/0x12000)=nil, &(0x7f0000602000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000601000/0x2000)=nil, 0x0, 0x0, r1}, 0x64) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f00000001c0)={0x100000, 0x4, 0xfffff000, 0x9, 0x7ff}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) io_setup(0x0, &(0x7f0000000180)) io_submit(0x0, 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000240)={'team_slave_1\x00'}) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890b, &(0x7f0000000340)={0x0, @in={0x2, 0x0, @multicast2}, @in={0x2, 0x0, @loopback=0x7f007500}, @xdp, 0x1ff}) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r2, r0, &(0x7f0000000040)=0x100060, 0xa808) [ 644.850748][T14324] EXT4-fs error (device loop3): ext4_quota_enable:6125: comm syz-executor.3: Bad quota inode # 4 [ 644.901825][T14324] EXT4-fs warning (device loop3): ext4_enable_quotas:6165: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 644.921984][T14322] EXT4-fs error (device loop5): ext4_quota_enable:6125: comm syz-executor.5: Bad quota inode # 4 02:17:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r0, 0x11, 0xa, 0x0, &(0x7f0000000080)) [ 645.051439][T14322] EXT4-fs warning (device loop5): ext4_enable_quotas:6165: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 645.071301][T14324] EXT4-fs (loop3): mount failed [ 645.111544][T14322] EXT4-fs (loop5): mount failed 02:17:03 executing program 1: bpf$BPF_BTF_LOAD(0x6, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 02:17:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:17:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {0x0, 0x0, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:17:04 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x28, 0x2, 0x3, 0x5, 0x0, 0x0, {}, [@NFQA_CFG_CMD={0x8, 0x1, {0x1}}, @NFQA_CFG_PARAMS={0x9, 0x2, {0x800, 0x2}}]}, 0x28}}, 0x0) 02:17:04 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000040)="640f21f3f20f2b2b26d9784a0f01c3d93926670fa80f3266b83d0000000f23280f21f86635000000040f23f826df1dbaa10066b8ef8dc56d66ef", 0x3a}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000100)={0xa0003}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40010c00004cf], 0x17001}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:17:04 executing program 1: prctl$PR_GET_TID_ADDRESS(0x24, 0x0) [ 645.889845][T14348] EXT4-fs error (device loop5): ext4_quota_enable:6125: comm syz-executor.5: Bad quota inode # 4 02:17:04 executing program 4: bpf$LINK_GET_FD_BY_ID(0x16, 0x0, 0x0) [ 645.897623][T14348] EXT4-fs warning (device loop5): ext4_enable_quotas:6165: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 645.907642][T14348] EXT4-fs (loop5): mount failed 02:17:04 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000040)="640f21f3f20f2b2b26d9784a0f01c3d93926670fa80f3266b83d0000000f23280f21f86635000000040f23f826df1dbaa10066b8ef8dc56d66ef", 0x3a}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000100)={0xa0003}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40010c00004cf], 0x17001}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:17:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) [ 645.971958][T14349] EXT4-fs error (device loop3): ext4_quota_enable:6125: comm syz-executor.3: Bad quota inode # 4 02:17:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00), 0x0, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 645.974119][T14349] EXT4-fs warning (device loop3): ext4_enable_quotas:6165: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 645.980836][T14349] EXT4-fs (loop3): mount failed 02:17:05 executing program 2: add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)='U', 0x1, 0xfffffffffffffffc) 02:17:05 executing program 1: syz_io_uring_setup(0x40002b70, &(0x7f0000000000)={0x0, 0x0, 0x10}, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 02:17:05 executing program 4: syz_io_uring_setup(0x2f5f, &(0x7f0000000200)={0x0, 0x0, 0x6, 0x203}, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x0, 0x0) [ 647.018536][T14373] EXT4-fs error (device loop3): ext4_quota_enable:6125: comm syz-executor.3: Bad quota inode # 4 02:17:05 executing program 2: timerfd_create(0x0, 0x0) r0 = io_uring_setup(0x6d32, &(0x7f0000000040)={0x0, 0x8306, 0x0, 0x0, 0x3a2}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) [ 647.178692][T14375] EXT4-fs error (device loop5): ext4_quota_enable:6125: comm syz-executor.5: Bad quota inode # 4 [ 647.198374][T14373] EXT4-fs warning (device loop3): ext4_enable_quotas:6165: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. 02:17:05 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000040)="640f21f3f20f2b2b26d9784a0f01c3d93926670fa80f3266b83d0000000f23280f21f86635000000040f23f826df1dbaa10066b8ef8dc56d66ef", 0x3a}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000100)={0xa0003}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40010c00004cf], 0x17001}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:17:05 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000540)={0x1c, 0xc, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x5}]}, 0x1c}}, 0x0) [ 647.357524][T14375] EXT4-fs warning (device loop5): ext4_enable_quotas:6165: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 647.407129][T14373] EXT4-fs (loop3): mount failed [ 647.447110][T14375] EXT4-fs (loop5): mount failed 02:17:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:17:06 executing program 4: prctl$PR_GET_TID_ADDRESS(0x2f, 0x0) 02:17:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00), 0x0, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:17:06 executing program 2: syslog(0x3, &(0x7f0000000100)=""/148, 0x94) 02:17:06 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000040)="640f21f3f20f2b2b26d9784a0f01c3d93926670fa80f3266b83d0000000f23280f21f86635000000040f23f826df1dbaa10066b8ef8dc56d66ef", 0x3a}], 0x1, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_GUEST_DEBUG(r1, 0x4048ae9b, &(0x7f0000000100)={0xa0003}) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40010c00004cf], 0x17001}) ioctl$KVM_RUN(r1, 0xae80, 0x0) 02:17:06 executing program 1: prctl$PR_GET_TID_ADDRESS(0x2a, &(0x7f0000001240)) [ 648.172962][T14407] EXT4-fs error (device loop3): ext4_quota_enable:6125: comm syz-executor.3: Bad quota inode # 3 [ 648.199672][T14407] EXT4-fs warning (device loop3): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. 02:17:07 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x12}, 0x40) [ 648.915667][T14407] EXT4-fs (loop3): mount failed 02:17:07 executing program 2: syz_mount_image$romfs(0x0, &(0x7f0000000200)='.\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 649.094160][T14417] EXT4-fs error (device loop5): ext4_quota_enable:6125: comm syz-executor.5: Bad quota inode # 4 [ 649.119605][T14417] EXT4-fs warning (device loop5): ext4_enable_quotas:6165: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 649.148630][T14417] EXT4-fs (loop5): mount failed 02:17:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00), 0x0, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:17:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:17:08 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='personality\x00') epoll_pwait(r0, 0x0, 0x3f, 0x0, 0x0, 0x0) 02:17:08 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000200)={0x28, 0x0, 0x0, @local}, 0x10) [ 649.903494][T14433] EXT4-fs error (device loop5): ext4_quota_enable:6125: comm syz-executor.5: Bad quota inode # 4 [ 649.929926][T14433] EXT4-fs warning (device loop5): ext4_enable_quotas:6165: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. 02:17:08 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000040)="640f21f3f20f2b2b26d9784a0f01c3d93926670fa80f3266b83d0000000f23280f21f86635000000040f23f826df1dbaa10066b8ef8dc56d66ef", 0x3a}], 0x1, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_GUEST_DEBUG(r1, 0x4048ae9b, &(0x7f0000000100)={0xa0003}) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40010c00004cf], 0x17001}) ioctl$KVM_RUN(r1, 0xae80, 0x0) 02:17:08 executing program 1: r0 = getpid() r1 = getpid() r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = epoll_create(0x8000) kcmp$KCMP_EPOLL_TFD(r0, r1, 0x7, r2, &(0x7f0000000180)={r3}) [ 650.015793][T14437] EXT4-fs error (device loop3): ext4_quota_enable:6125: comm syz-executor.3: Bad quota inode # 3 [ 650.034601][T14437] EXT4-fs warning (device loop3): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 650.057169][T14437] EXT4-fs (loop3): mount failed [ 650.069573][T14433] EXT4-fs (loop5): mount failed 02:17:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:17:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f0000000000000100800000", 0x1f, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:17:08 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x1c, 0x1, 0x4, 0x101, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5}]}, 0x1c}}, 0x0) 02:17:09 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14, 0x2, 0x4, 0x101}, 0x14}}, 0x0) 02:17:09 executing program 2: perf_event_open(&(0x7f0000000800)={0x2, 0x70, 0xba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:17:09 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000040)="640f21f3f20f2b2b26d9784a0f01c3d93926670fa80f3266b83d0000000f23280f21f86635000000040f23f826df1dbaa10066b8ef8dc56d66ef", 0x3a}], 0x1, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_GUEST_DEBUG(r1, 0x4048ae9b, &(0x7f0000000100)={0xa0003}) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40010c00004cf], 0x17001}) ioctl$KVM_RUN(r1, 0xae80, 0x0) [ 650.844028][T14454] EXT4-fs error (device loop3): ext4_quota_enable:6125: comm syz-executor.3: Bad quota inode # 3 [ 650.910866][T14456] EXT4-fs warning (device loop5): ext4_enable_quotas:6165: Failed to enable quota tracking (type=1, err=-22). Please run e2fsck to fix. [ 650.931659][T14454] EXT4-fs warning (device loop3): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 651.097367][T14454] EXT4-fs (loop3): mount failed [ 651.109607][T14456] EXT4-fs (loop5): mount failed 02:17:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x87, &(0x7f0000000180), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) r3 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(0xffffffffffffffff, 0x0, 0x5) r4 = dup(r3) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_CLOSE={0x13, 0x0, 0x0, r4}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) 02:17:09 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000100)={0xa0003}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40010c00004cf], 0x17001}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:17:09 executing program 2: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}}, 0x0) 02:17:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f0000000000000100800000", 0x1f, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:17:09 executing program 4: prctl$PR_GET_TID_ADDRESS(0x3a, &(0x7f0000001240)) 02:17:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0, 0x0, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) [ 651.851452][T14481] EXT4-fs warning (device loop5): ext4_enable_quotas:6165: Failed to enable quota tracking (type=1, err=-22). Please run e2fsck to fix. 02:17:10 executing program 1: prctl$PR_GET_TID_ADDRESS(0xf, &(0x7f0000001240)) [ 651.986906][T14481] EXT4-fs (loop5): mount failed 02:17:10 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYNAME(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0xe, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x28}}, 0x0) 02:17:10 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000100)={0xa0003}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40010c00004cf], 0x17001}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 652.166024][T14495] EXT4-fs error (device loop3): ext4_quota_enable:6125: comm syz-executor.3: Bad quota inode # 3 02:17:10 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xf2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) syz_genetlink_get_family_id$batadv(0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)=0x2) read(r1, 0x0, 0x6c00) dup3(r1, r0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) [ 652.322669][T14495] EXT4-fs warning (device loop3): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 652.422678][T14495] EXT4-fs (loop3): mount failed 02:17:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f0000000000000100800000", 0x1f, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:17:11 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000100)={0xa0003}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40010c00004cf], 0x17001}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:17:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0, 0x0, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:17:11 executing program 1: prctl$PR_GET_TID_ADDRESS(0x22, 0x0) 02:17:11 executing program 2: syz_io_uring_setup(0x40002b70, &(0x7f0000000000), &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, 0x0, 0x0) [ 653.340454][T14519] EXT4-fs warning (device loop5): ext4_enable_quotas:6165: Failed to enable quota tracking (type=1, err=-22). Please run e2fsck to fix. 02:17:11 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xf2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) syz_genetlink_get_family_id$batadv(0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)=0x2) read(r1, 0x0, 0x6c00) dup3(r1, r0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) [ 653.416489][T14519] EXT4-fs (loop5): mount failed [ 653.596143][T14527] EXT4-fs error (device loop3): ext4_quota_enable:6125: comm syz-executor.3: Bad quota inode # 3 02:17:12 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x7, 0x0, 0x0, 0x3}, 0x40) [ 653.723460][T14527] EXT4-fs warning (device loop3): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 653.765820][T14527] EXT4-fs (loop3): mount failed 02:17:12 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000100)={0xa0003}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40010c00004cf], 0x17001}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:17:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400", 0x2e, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:17:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0, 0x0, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:17:12 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001300)={&(0x7f0000001180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f0000001240)=""/156, 0x26, 0x9c, 0x1}, 0x20) 02:17:12 executing program 1: [ 654.672103][T14550] EXT4-fs error (device loop5): ext4_ext_check_inode:459: inode #4: comm syz-executor.5: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) 02:17:13 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000100)={0xa0003}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40010c00004cf], 0x17001}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:17:13 executing program 4: [ 654.752467][T14550] EXT4-fs error (device loop5): ext4_quota_enable:6125: comm syz-executor.5: Bad quota inode # 4 [ 654.904723][T14555] EXT4-fs error (device loop3): ext4_quota_enable:6125: comm syz-executor.3: Bad quota inode # 3 [ 654.921734][T14550] EXT4-fs warning (device loop5): ext4_enable_quotas:6165: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix. [ 654.942580][T14555] EXT4-fs warning (device loop3): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 655.019085][T14555] EXT4-fs (loop3): mount failed [ 655.041126][T14550] EXT4-fs (loop5): mount failed 02:17:13 executing program 4: 02:17:13 executing program 1: 02:17:13 executing program 2: 02:17:13 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800), 0x0, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:17:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400", 0x2e, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:17:14 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000100)={0xa0003}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40010c00004cf], 0x17001}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:17:14 executing program 1: 02:17:14 executing program 2: 02:17:14 executing program 4: [ 655.805908][T14573] EXT4-fs error (device loop3): ext4_quota_enable:6125: comm syz-executor.3: Bad quota inode # 3 [ 655.855462][T14573] EXT4-fs warning (device loop3): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 655.984591][T14573] EXT4-fs (loop3): mount failed 02:17:14 executing program 1: 02:17:14 executing program 2: [ 656.133396][T14580] EXT4-fs error (device loop5): ext4_ext_check_inode:459: inode #4: comm syz-executor.5: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 656.325382][T14580] EXT4-fs error (device loop5): ext4_quota_enable:6125: comm syz-executor.5: Bad quota inode # 4 [ 656.362255][T14580] EXT4-fs warning (device loop5): ext4_enable_quotas:6165: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix. [ 656.469089][T14580] EXT4-fs (loop5): mount failed 02:17:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800), 0x0, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:17:14 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000040)="640f21f3f20f2b2b26d9784a0f01c3d93926670fa80f3266b83d0000000f23280f21f86635000000040f23f826df1dbaa10066b8ef8dc56d66ef", 0x3a}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000100)={0xa0003}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40010c00004cf], 0x17001}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:17:14 executing program 1: 02:17:15 executing program 4: 02:17:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400", 0x2e, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:17:15 executing program 2: 02:17:15 executing program 1: 02:17:15 executing program 4: [ 657.111010][T14602] EXT4-fs error (device loop3): ext4_quota_enable:6125: comm syz-executor.3: Bad quota inode # 3 [ 657.167968][T14602] EXT4-fs warning (device loop3): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. 02:17:15 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000040)="640f21f3f20f2b2b26d9784a0f01c3d93926670fa80f3266b83d0000000f23280f21f86635000000040f23f826df1dbaa10066b8ef8dc56d66ef", 0x3a}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000100)={0xa0003}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40010c00004cf], 0x17001}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 657.342234][T14602] EXT4-fs (loop3): mount failed [ 657.374370][T14608] EXT4-fs error (device loop5): ext4_ext_check_inode:459: inode #4: comm syz-executor.5: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 657.393824][T14608] EXT4-fs error (device loop5): ext4_quota_enable:6125: comm syz-executor.5: Bad quota inode # 4 [ 657.406091][T14608] EXT4-fs warning (device loop5): ext4_enable_quotas:6165: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix. [ 657.427460][T14608] EXT4-fs (loop5): mount failed 02:17:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004000000000000000000", 0x36, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:17:16 executing program 2: 02:17:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800), 0x0, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:17:16 executing program 4: 02:17:16 executing program 1: 02:17:16 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000040)="640f21f3f20f2b2b26d9784a0f01c3d93926670fa80f3266b83d0000000f23280f21f86635000000040f23f826df1dbaa10066b8ef8dc56d66ef", 0x3a}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000100)={0xa0003}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40010c00004cf], 0x17001}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 658.217767][T14623] EXT4-fs error (device loop5): ext4_ext_check_inode:459: inode #4: comm syz-executor.5: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) 02:17:16 executing program 4: [ 658.359519][T14623] EXT4-fs error (device loop5): ext4_quota_enable:6125: comm syz-executor.5: Bad quota inode # 4 [ 658.402995][T14623] EXT4-fs warning (device loop5): ext4_enable_quotas:6165: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix. [ 658.429241][T14629] EXT4-fs error (device loop3): ext4_quota_enable:6125: comm syz-executor.3: Bad quota inode # 3 02:17:16 executing program 1: [ 658.457454][T14629] EXT4-fs warning (device loop3): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 658.479042][T14623] EXT4-fs (loop5): mount failed [ 658.503114][T14629] EXT4-fs (loop3): mount failed 02:17:16 executing program 2: 02:17:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004000000000000000000", 0x36, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:17:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f0000000000000100800000", 0x1f, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:17:17 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000040)="640f21f3f20f2b2b26d9784a0f01c3d93926670fa80f3266b83d0000000f23280f21f86635000000040f23f826df1dbaa10066b8ef8dc56d66ef", 0x3a}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000100)={0xa0003}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40010c00004cf], 0x17001}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:17:17 executing program 4: 02:17:17 executing program 2: 02:17:17 executing program 1: [ 659.243110][T14645] EXT4-fs error (device loop5): ext4_ext_check_inode:459: inode #4: comm syz-executor.5: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 659.452368][T14645] EXT4-fs error (device loop5): ext4_quota_enable:6125: comm syz-executor.5: Bad quota inode # 4 [ 659.489743][T14645] EXT4-fs warning (device loop5): ext4_enable_quotas:6165: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix. [ 659.531347][T14645] EXT4-fs (loop5): mount failed [ 659.560726][T14655] EXT4-fs warning (device loop3): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 659.608730][T14655] EXT4-fs (loop3): mount failed 02:17:18 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000040)="640f21f3f20f2b2b26d9784a0f01c3d93926670fa80f3266b83d0000000f23280f21f86635000000040f23f826df1dbaa10066b8ef8dc56d66ef", 0x3a}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000100)={0xa0003}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40010c00004cf], 0x17001}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:17:18 executing program 4: 02:17:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004000000000000000000", 0x36, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:17:18 executing program 2: 02:17:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f0000000000000100800000", 0x1f, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:17:18 executing program 1: 02:17:18 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000040)="640f21f3f20f2b2b26d9784a0f01c3d93926670fa80f3266b83d0000000f23280f21f86635000000040f23f826df1dbaa10066b8ef8dc56d66ef", 0x3a}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000100)={0xa0003}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40010c00004cf], 0x17001}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:17:18 executing program 1: [ 660.458207][T14674] EXT4-fs warning (device loop3): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 660.532582][T14676] EXT4-fs error (device loop5): ext4_ext_check_inode:459: inode #4: comm syz-executor.5: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 660.636099][T14674] EXT4-fs (loop3): mount failed 02:17:19 executing program 2: [ 660.690695][T14676] EXT4-fs error (device loop5): ext4_quota_enable:6125: comm syz-executor.5: Bad quota inode # 4 02:17:19 executing program 4: [ 660.738515][T14676] EXT4-fs warning (device loop5): ext4_enable_quotas:6165: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix. [ 660.823370][T14676] EXT4-fs (loop5): mount failed 02:17:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f0000000000000100800000", 0x1f, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:17:19 executing program 1: 02:17:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:17:19 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000040)="640f21f3f20f2b2b26d9784a0f01c3d93926670fa80f3266b83d0000000f23280f21f86635000000040f23f826df1dbaa10066b8ef8dc56d66ef", 0x3a}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000100)={0xa0003}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40010c00004cf], 0x17001}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:17:19 executing program 2: [ 661.552918][T14693] EXT4-fs warning (device loop3): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. 02:17:20 executing program 4: 02:17:20 executing program 1: [ 661.695929][T14693] EXT4-fs (loop3): mount failed [ 661.966296][T14700] EXT4-fs error (device loop5): ext4_ext_check_inode:459: inode #4: comm syz-executor.5: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) 02:17:20 executing program 2: 02:17:20 executing program 1: [ 662.158897][T14700] EXT4-fs error (device loop5): ext4_quota_enable:6125: comm syz-executor.5: Bad quota inode # 4 02:17:20 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000040)="640f21f3f20f2b2b26d9784a0f01c3d93926670fa80f3266b83d0000000f23280f21f86635000000040f23f826df1dbaa10066b8ef8dc56d66ef", 0x3a}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000100)={0xa0003}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40010c00004cf], 0x17001}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:17:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400", 0x2e, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) [ 662.201494][T14700] EXT4-fs warning (device loop5): ext4_enable_quotas:6165: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix. [ 662.273752][T14700] EXT4-fs (loop5): mount failed 02:17:20 executing program 4: 02:17:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:17:21 executing program 2: [ 662.797849][T14721] EXT4-fs error (device loop3): ext4_ext_check_inode:459: inode #3: comm syz-executor.3: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) 02:17:21 executing program 4: [ 662.943835][T14721] EXT4-fs error (device loop3): ext4_quota_enable:6125: comm syz-executor.3: Bad quota inode # 3 02:17:21 executing program 1: 02:17:21 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000040)="640f21f3f20f2b2b26d9784a0f01c3d93926670fa80f3266b83d0000000f23280f21f86635000000040f23f826df1dbaa10066b8ef8dc56d66ef", 0x3a}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000100)={0xa0003}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40010c00004cf], 0x17001}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 663.034097][T14721] EXT4-fs warning (device loop3): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 663.147899][T14721] EXT4-fs (loop3): mount failed [ 663.420092][T14727] EXT4-fs error (device loop5): ext4_ext_check_inode:459: inode #4: comm syz-executor.5: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) 02:17:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400", 0x2e, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) [ 663.616945][T14727] EXT4-fs error (device loop5): ext4_quota_enable:6125: comm syz-executor.5: Bad quota inode # 4 02:17:22 executing program 2: [ 663.686082][T14727] EXT4-fs warning (device loop5): ext4_enable_quotas:6165: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix. 02:17:22 executing program 1: [ 663.818013][T14727] EXT4-fs (loop5): mount failed 02:17:22 executing program 4: 02:17:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 664.615954][T14745] EXT4-fs error (device loop5): ext4_ext_check_inode:459: inode #4: comm syz-executor.5: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 664.740942][T14748] EXT4-fs error (device loop3): ext4_ext_check_inode:459: inode #3: comm syz-executor.3: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 664.775931][T14745] EXT4-fs error (device loop5): ext4_quota_enable:6125: comm syz-executor.5: Bad quota inode # 4 [ 664.820547][T14745] EXT4-fs warning (device loop5): ext4_enable_quotas:6165: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix. 02:17:23 executing program 1: 02:17:23 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000040)="640f21f3f20f2b2b26d9784a0f01c3d93926670fa80f3266b83d0000000f23280f21f86635000000040f23f826df1dbaa10066b8ef8dc56d66ef", 0x3a}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_GUEST_DEBUG(0xffffffffffffffff, 0x4048ae9b, &(0x7f0000000100)={0xa0003}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40010c00004cf], 0x17001}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 664.939723][T14748] EXT4-fs error (device loop3): ext4_quota_enable:6125: comm syz-executor.3: Bad quota inode # 3 [ 664.960722][T14745] EXT4-fs (loop5): mount failed 02:17:23 executing program 4: 02:17:23 executing program 2: [ 665.126470][T14748] EXT4-fs warning (device loop3): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 665.292673][T14748] EXT4-fs (loop3): mount failed 02:17:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004000000000000000000000002000000", 0x3c, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:17:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400", 0x2e, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:17:24 executing program 1: 02:17:24 executing program 4: 02:17:24 executing program 2: [ 666.118210][T14765] EXT4-fs error (device loop5): ext4_ext_check_inode:459: inode #4: comm syz-executor.5: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) 02:17:24 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000040)="640f21f3f20f2b2b26d9784a0f01c3d93926670fa80f3266b83d0000000f23280f21f86635000000040f23f826df1dbaa10066b8ef8dc56d66ef", 0x3a}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_GUEST_DEBUG(0xffffffffffffffff, 0x4048ae9b, &(0x7f0000000100)={0xa0003}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40010c00004cf], 0x17001}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 666.312174][T14771] EXT4-fs error (device loop3): ext4_ext_check_inode:459: inode #3: comm syz-executor.3: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 666.366838][T14765] EXT4-fs error (device loop5): ext4_quota_enable:6125: comm syz-executor.5: Bad quota inode # 4 [ 666.430023][T14765] EXT4-fs warning (device loop5): ext4_enable_quotas:6165: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix. [ 666.523941][T14771] EXT4-fs error (device loop3): ext4_quota_enable:6125: comm syz-executor.3: Bad quota inode # 3 02:17:25 executing program 1: [ 666.585244][T14771] EXT4-fs warning (device loop3): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 666.614020][T14765] EXT4-fs (loop5): mount failed [ 666.667955][T14771] EXT4-fs (loop3): mount failed 02:17:25 executing program 4: 02:17:25 executing program 2: 02:17:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004000000000000000000000002000000", 0x3c, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:17:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004000000000000000000", 0x36, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:17:25 executing program 1: 02:17:25 executing program 4: 02:17:25 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000040)="640f21f3f20f2b2b26d9784a0f01c3d93926670fa80f3266b83d0000000f23280f21f86635000000040f23f826df1dbaa10066b8ef8dc56d66ef", 0x3a}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_GUEST_DEBUG(0xffffffffffffffff, 0x4048ae9b, &(0x7f0000000100)={0xa0003}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40010c00004cf], 0x17001}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:17:25 executing program 2: [ 667.564770][T14790] EXT4-fs error (device loop3): ext4_ext_check_inode:459: inode #3: comm syz-executor.3: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 667.620455][T14790] EXT4-fs error (device loop3): ext4_quota_enable:6125: comm syz-executor.3: Bad quota inode # 3 [ 667.656079][T14790] EXT4-fs warning (device loop3): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 667.658137][T14790] EXT4-fs (loop3): mount failed [ 667.717375][T14792] EXT4-fs error (device loop5): ext4_ext_check_inode:459: inode #4: comm syz-executor.5: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 667.874781][T14792] EXT4-fs error (device loop5): ext4_quota_enable:6125: comm syz-executor.5: Bad quota inode # 4 02:17:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004000000000000000000", 0x36, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) [ 667.981032][T14792] EXT4-fs warning (device loop5): ext4_enable_quotas:6165: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix. [ 668.127720][T14792] EXT4-fs (loop5): mount failed 02:17:26 executing program 1: 02:17:26 executing program 4: 02:17:26 executing program 2: 02:17:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004000000000000000000000002000000", 0x3c, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 668.629913][T14808] EXT4-fs error (device loop3): ext4_ext_check_inode:459: inode #3: comm syz-executor.3: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) 02:17:27 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000040)="640f21f3f20f2b2b26d9784a0f01c3d93926670fa80f3266b83d0000000f23280f21f86635000000040f23f826df1dbaa10066b8ef8dc56d66ef", 0x3a}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40010c00004cf], 0x17001}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 668.737069][T14808] EXT4-fs error (device loop3): ext4_quota_enable:6125: comm syz-executor.3: Bad quota inode # 3 [ 668.834063][T14808] EXT4-fs warning (device loop3): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. 02:17:27 executing program 4: [ 669.048045][T14808] EXT4-fs (loop3): mount failed 02:17:27 executing program 4: 02:17:27 executing program 1: [ 669.371238][T14817] EXT4-fs error (device loop5): ext4_ext_check_inode:459: inode #4: comm syz-executor.5: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) 02:17:27 executing program 2: 02:17:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004000000000000000000", 0x36, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) [ 669.591399][T14817] EXT4-fs error (device loop5): ext4_quota_enable:6125: comm syz-executor.5: Bad quota inode # 4 [ 669.684717][T14817] EXT4-fs warning (device loop5): ext4_enable_quotas:6165: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix. [ 669.780421][T14817] EXT4-fs (loop5): mount failed 02:17:28 executing program 4: 02:17:28 executing program 1: 02:17:28 executing program 2: 02:17:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 670.145010][T14834] EXT4-fs error (device loop3): ext4_ext_check_inode:459: inode #3: comm syz-executor.3: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 670.179508][T14834] EXT4-fs error (device loop3): ext4_quota_enable:6125: comm syz-executor.3: Bad quota inode # 3 [ 670.191519][T14834] EXT4-fs warning (device loop3): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 670.208698][T14834] EXT4-fs (loop3): mount failed 02:17:28 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000040)="640f21f3f20f2b2b26d9784a0f01c3d93926670fa80f3266b83d0000000f23280f21f86635000000040f23f826df1dbaa10066b8ef8dc56d66ef", 0x3a}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40010c00004cf], 0x17001}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:17:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:17:28 executing program 4: 02:17:29 executing program 1: 02:17:29 executing program 2: [ 670.731731][T14844] EXT4-fs error (device loop5): ext4_quota_enable:6125: comm syz-executor.5: Bad quota inode # 4 02:17:29 executing program 1: [ 670.934284][T14844] EXT4-fs warning (device loop5): ext4_enable_quotas:6165: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 670.969703][T14844] EXT4-fs (loop5): mount failed [ 670.984557][T14852] EXT4-fs error (device loop3): ext4_ext_check_inode:459: inode #3: comm syz-executor.3: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) 02:17:29 executing program 4: 02:17:29 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000040)="640f21f3f20f2b2b26d9784a0f01c3d93926670fa80f3266b83d0000000f23280f21f86635000000040f23f826df1dbaa10066b8ef8dc56d66ef", 0x3a}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40010c00004cf], 0x17001}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 671.127518][T14852] EXT4-fs error (device loop3): ext4_quota_enable:6125: comm syz-executor.3: Bad quota inode # 3 [ 671.161030][T14852] EXT4-fs warning (device loop3): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 671.273084][T14852] EXT4-fs (loop3): mount failed 02:17:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:17:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:17:30 executing program 2: 02:17:30 executing program 1: 02:17:30 executing program 4: [ 671.859566][T14868] EXT4-fs error (device loop5): ext4_quota_enable:6125: comm syz-executor.5: Bad quota inode # 4 02:17:30 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000040)="640f21f3f20f2b2b26d9784a0f01c3d93926670fa80f3266b83d0000000f23280f21f86635000000040f23f826df1dbaa10066b8ef8dc56d66ef", 0x3a}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000100)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40010c00004cf], 0x17001}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 671.991576][T14868] EXT4-fs warning (device loop5): ext4_enable_quotas:6165: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 672.104885][T14868] EXT4-fs (loop5): mount failed [ 672.256478][T14875] EXT4-fs error (device loop3): ext4_ext_check_inode:459: inode #3: comm syz-executor.3: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) 02:17:30 executing program 4: [ 672.473381][T14875] EXT4-fs error (device loop3): ext4_quota_enable:6125: comm syz-executor.3: Bad quota inode # 3 02:17:30 executing program 1: 02:17:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:17:31 executing program 2: [ 672.599965][T14875] EXT4-fs warning (device loop3): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 672.676032][T14875] EXT4-fs (loop3): mount failed 02:17:31 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000040)="640f21f3f20f2b2b26d9784a0f01c3d93926670fa80f3266b83d0000000f23280f21f86635000000040f23f826df1dbaa10066b8ef8dc56d66ef", 0x3a}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000100)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40010c00004cf], 0x17001}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:17:31 executing program 4: 02:17:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) [ 673.130079][T14892] EXT4-fs error (device loop5): ext4_quota_enable:6125: comm syz-executor.5: Bad quota inode # 4 02:17:31 executing program 1: 02:17:31 executing program 2: [ 673.245187][T14892] EXT4-fs warning (device loop5): ext4_enable_quotas:6165: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 673.269615][T14892] EXT4-fs (loop5): mount failed 02:17:31 executing program 4: 02:17:31 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000040)="640f21f3f20f2b2b26d9784a0f01c3d93926670fa80f3266b83d0000000f23280f21f86635000000040f23f826df1dbaa10066b8ef8dc56d66ef", 0x3a}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000100)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40010c00004cf], 0x17001}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:17:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:17:32 executing program 4: [ 673.683046][T14904] EXT4-fs error (device loop3): ext4_ext_check_inode:459: inode #3: comm syz-executor.3: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) 02:17:32 executing program 2: [ 673.846140][T14904] EXT4-fs error (device loop3): ext4_quota_enable:6125: comm syz-executor.3: Bad quota inode # 3 02:17:32 executing program 1: [ 673.920150][T14904] EXT4-fs warning (device loop3): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 674.010384][T14904] EXT4-fs (loop3): mount failed [ 674.093300][T14915] EXT4-fs error (device loop5): ext4_quota_enable:6125: comm syz-executor.5: Bad quota inode # 3 02:17:32 executing program 4: [ 674.220867][T14915] EXT4-fs warning (device loop5): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 674.290697][T14915] EXT4-fs (loop5): mount failed 02:17:32 executing program 2: bpf$ITER_CREATE(0x7, &(0x7f0000000000), 0x8) 02:17:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004000000000000000000000002000000", 0x3c, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:17:33 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000040)="640f21f3f20f2b2b26d9784a0f01c3d93926670fa80f3266b83d0000000f23280f21f86635000000040f23f826df1dbaa10066b8ef8dc56d66ef", 0x3a}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000100)={0xa0003}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40010c00004cf], 0x17001}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:17:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:17:33 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x4840, 0x0) 02:17:33 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000340)=[{0x0}, {&(0x7f00000001c0)='K', 0x1}], 0x2}, 0x0) [ 674.979345][T14931] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. 02:17:33 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) [ 675.046065][T14932] EXT4-fs error (device loop3): ext4_ext_check_inode:459: inode #3: comm syz-executor.3: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 675.131385][T14939] EXT4-fs error (device loop5): ext4_quota_enable:6125: comm syz-executor.5: Bad quota inode # 3 [ 675.172400][T14939] EXT4-fs warning (device loop5): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 675.180136][T14932] EXT4-fs error (device loop3): ext4_quota_enable:6125: comm syz-executor.3: Bad quota inode # 3 02:17:33 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000040)="640f21f3f20f2b2b26d9784a0f01c3d93926670fa80f3266b83d0000000f23280f21f86635000000040f23f826df1dbaa10066b8ef8dc56d66ef", 0x3a}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000100)={0xa0003}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40010c00004cf], 0x17001}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 675.216004][T14939] EXT4-fs (loop5): mount failed 02:17:33 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 675.375301][T14932] EXT4-fs warning (device loop3): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 675.468023][T14932] EXT4-fs (loop3): mount failed 02:17:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:17:34 executing program 4: perf_event_open(&(0x7f00000010c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x208}, 0x0, 0x0, 0xffffffffffffffff, 0x8) [ 675.726146][T14953] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. 02:17:34 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x40) 02:17:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004000000000000000000000002000000", 0x3c, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:17:34 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001440)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETVNETBE(r0, 0x400454de, 0x0) 02:17:34 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000040)="640f21f3f20f2b2b26d9784a0f01c3d93926670fa80f3266b83d0000000f23280f21f86635000000040f23f826df1dbaa10066b8ef8dc56d66ef", 0x3a}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000100)={0xa0003}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40010c00004cf], 0x17001}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 676.074749][T14961] EXT4-fs error (device loop5): ext4_quota_enable:6125: comm syz-executor.5: Bad quota inode # 3 [ 676.097069][T14961] EXT4-fs warning (device loop5): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. 02:17:34 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 676.153294][T14961] EXT4-fs (loop5): mount failed [ 676.373872][T14970] EXT4-fs error (device loop3): ext4_ext_check_inode:459: inode #3: comm syz-executor.3: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) 02:17:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0, 0x0, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:17:34 executing program 2: bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000016c0)={0x0, 0x0, 0x0, 0x0}, 0x38) [ 676.584482][T14970] EXT4-fs error (device loop3): ext4_quota_enable:6125: comm syz-executor.3: Bad quota inode # 3 02:17:35 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x32600) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x0, 0xa0, 0x0, 0xdc4, 0xffffffffffffffff, 0x9c, [], 0x0, r0, 0x2, 0x0, 0x3}, 0x40) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x1f, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3, 0x4, 0x0, 0x2e5}, 0x0, 0xa, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xc, 0x6, &(0x7f0000000340)=ANY=[@ANYBLOB="180019b7f5f805d7ebe9f85e6ef9fd5e0000000400000000000002000000c582000010", @ANYRES32=r1, @ANYBLOB='\n'], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x7, &(0x7f00000002c0)=""/7, 0x41100, 0xa, [], 0x0, 0x4, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, 0x0, 0x0, 0x0, r2}, 0x78) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xda00) r5 = socket$kcm(0xa, 0x802, 0x88) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00memory \x00cou -yau '], 0x12) write$cgroup_int(r4, &(0x7f0000000200)=0x3b, 0x43408) [ 676.658617][T14970] EXT4-fs warning (device loop3): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 676.698111][T14970] EXT4-fs (loop3): mount failed 02:17:35 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004000000000000000000000002000000", 0x3c, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) [ 677.124711][T14985] EXT4-fs error (device loop5): ext4_quota_enable:6125: comm syz-executor.5: Bad quota inode # 3 [ 677.140894][T14985] EXT4-fs warning (device loop5): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 677.167281][T14985] EXT4-fs (loop5): mount failed 02:17:35 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000040)="640f21f3f20f2b2b26d9784a0f01c3d93926670fa80f3266b83d0000000f23280f21f86635000000040f23f826df1dbaa10066b8ef8dc56d66ef", 0x3a}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000100)={0xa0003}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:17:35 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x17, 0xffffffd8, 0x0, 0x800001}, 0x40) [ 677.342286][ T31] audit: type=1804 audit(1605061055.733:6): pid=14990 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir056918529/syzkaller.pVm0am/255/memory.events" dev="sda1" ino=16384 res=1 errno=0 02:17:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0, 0x0, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:17:35 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f00000002c0)="da", 0x1}, {0x0}, {&(0x7f00000003c0)="83", 0x1}], 0x3}, 0x0) [ 677.748416][T14994] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 677.836831][T14998] EXT4-fs error (device loop3): ext4_ext_check_inode:459: inode #3: comm syz-executor.3: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 678.050856][T14998] EXT4-fs error (device loop3): ext4_quota_enable:6125: comm syz-executor.3: Bad quota inode # 3 [ 678.137992][T14998] EXT4-fs warning (device loop3): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 678.159680][ T31] audit: type=1804 audit(1605061056.553:7): pid=14992 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir056918529/syzkaller.pVm0am/255/memory.events" dev="sda1" ino=16384 res=1 errno=0 02:17:36 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000015c00)={0x0, 0x0, 0x0}, 0x700) [ 678.341008][T15008] EXT4-fs error (device loop5): ext4_quota_enable:6125: comm syz-executor.5: Bad quota inode # 3 [ 678.374299][T15008] EXT4-fs warning (device loop5): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 678.389227][T14998] EXT4-fs (loop3): mount failed 02:17:36 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000040)="640f21f3f20f2b2b26d9784a0f01c3d93926670fa80f3266b83d0000000f23280f21f86635000000040f23f826df1dbaa10066b8ef8dc56d66ef", 0x3a}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000100)={0xa0003}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 678.446981][T15008] EXT4-fs (loop5): mount failed 02:17:37 executing program 4: socketpair(0x18, 0x0, 0x7, &(0x7f0000000200)) 02:17:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:17:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0, 0x0, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 678.921970][T14990] syz-executor.1 (14990) used greatest stack depth: 4352 bytes left 02:17:37 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) [ 679.070815][T15018] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. 02:17:37 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000100)=""/244, 0xf4}], 0x1}, 0x0) 02:17:37 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000040)="640f21f3f20f2b2b26d9784a0f01c3d93926670fa80f3266b83d0000000f23280f21f86635000000040f23f826df1dbaa10066b8ef8dc56d66ef", 0x3a}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000100)={0xa0003}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 679.421467][T15027] EXT4-fs error (device loop3): ext4_quota_enable:6125: comm syz-executor.3: Bad quota inode # 3 [ 679.447887][T15027] EXT4-fs warning (device loop3): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 679.464281][T15027] EXT4-fs (loop3): mount failed [ 679.581369][T15032] EXT4-fs error (device loop5): ext4_quota_enable:6125: comm syz-executor.5: Bad quota inode # 3 02:17:38 executing program 2: socketpair(0xb, 0x0, 0x0, &(0x7f00000000c0)) 02:17:38 executing program 1: r0 = socket$tipc(0x1e, 0x2, 0x0) accept4$tipc(r0, 0x0, 0x0, 0x0) [ 679.636805][T15032] EXT4-fs warning (device loop5): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 679.796275][T15032] EXT4-fs (loop5): mount failed 02:17:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) [ 679.979484][T15044] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. 02:17:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800), 0x0, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:17:38 executing program 1: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x700) 02:17:38 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000040)="640f21f3f20f2b2b26d9784a0f01c3d93926670fa80f3266b83d0000000f23280f21f86635000000040f23f826df1dbaa10066b8ef8dc56d66ef", 0x3a}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000100)={0xa0003}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000280)={[], 0x17001}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 680.352196][T15052] EXT4-fs error (device loop3): ext4_quota_enable:6125: comm syz-executor.3: Bad quota inode # 3 02:17:38 executing program 2: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)="e1", 0x1}], 0x1}, 0x4040000) [ 680.479030][T15052] EXT4-fs warning (device loop3): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. 02:17:38 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)="e1", 0x1}], 0x1}, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg(r1, &(0x7f0000003880)={0x0, 0x0, &(0x7f0000003580)=[{&(0x7f00000012c0)='#', 0x1}], 0x1}, 0x8000) [ 680.539446][T15058] EXT4-fs error (device loop5): ext4_quota_enable:6125: comm syz-executor.5: Bad quota inode # 3 [ 680.555979][T15058] EXT4-fs warning (device loop5): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 680.605709][T15058] EXT4-fs (loop5): mount failed [ 680.611569][T15052] EXT4-fs (loop3): mount failed 02:17:39 executing program 4: bpf$BPF_MAP_GET_FD_BY_ID(0x8, 0x0, 0x0) 02:17:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800), 0x0, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:17:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:17:39 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000000c0)='#', 0x1}, {&(0x7f00000001c0)='K', 0x1}, {&(0x7f0000000280)='d', 0x1}], 0x3, &(0x7f0000000380)=[@ip_tos_int={{0x14}}], 0x18}, 0x0) 02:17:39 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001140)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 02:17:39 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000040)="640f21f3f20f2b2b26d9784a0f01c3d93926670fa80f3266b83d0000000f23280f21f86635000000040f23f826df1dbaa10066b8ef8dc56d66ef", 0x3a}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000100)={0xa0003}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000280)={[], 0x17001}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:17:39 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_tracing={0x1a, 0x3, &(0x7f0000000080)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 681.450782][T15079] EXT4-fs error (device loop3): ext4_quota_enable:6125: comm syz-executor.3: Bad quota inode # 3 [ 681.512553][T15082] EXT4-fs error (device loop5): ext4_quota_enable:6125: comm syz-executor.5: Bad quota inode # 3 [ 681.540832][T15079] EXT4-fs warning (device loop3): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. 02:17:40 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000000c0)='#', 0x1}], 0x1}, 0x0) [ 681.611083][T15082] EXT4-fs warning (device loop5): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 681.629343][T15079] EXT4-fs (loop3): mount failed [ 681.723223][T15082] EXT4-fs (loop5): mount failed 02:17:40 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:17:40 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140), 0x8, 0x10, 0x0}, 0x78) 02:17:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800), 0x0, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:17:40 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000480)={&(0x7f0000000080)={0x2, 0x0, @private}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x10}}], 0x28}, 0x0) 02:17:40 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000015c00)={0x0, 0x0, 0x0}, 0x12041) 02:17:40 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000040)="640f21f3f20f2b2b26d9784a0f01c3d93926670fa80f3266b83d0000000f23280f21f86635000000040f23f826df1dbaa10066b8ef8dc56d66ef", 0x3a}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000100)={0xa0003}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000280)={[], 0x17001}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 682.451354][T15103] EXT4-fs error (device loop3): ext4_fill_super:4709: inode #2: comm syz-executor.3: iget: root inode unallocated [ 682.465262][T15103] EXT4-fs (loop3): get root inode failed [ 682.471389][T15103] EXT4-fs (loop3): mount failed [ 682.615036][T15110] EXT4-fs error (device loop5): ext4_quota_enable:6125: comm syz-executor.5: Bad quota inode # 3 02:17:41 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000019c0)={0x0, 0x0, 0x0}, 0x40) 02:17:41 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001440)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f00000000c0)={'syzkaller0\x00', @local}) [ 682.713164][T15110] EXT4-fs warning (device loop5): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 682.784400][T15110] EXT4-fs (loop5): mount failed 02:17:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:17:41 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000040)="640f21f3f20f2b2b26d9784a0f01c3d93926670fa80f3266b83d0000000f23280f21f86635000000040f23f826df1dbaa10066b8ef8dc56d66ef", 0x3a}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000100)={0xa0003}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40010c00004cf]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:17:41 executing program 1: perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:17:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f0000000000000100800000", 0x1f, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 683.254635][T15128] EXT4-fs error (device loop3): ext4_fill_super:4709: inode #2: comm syz-executor.3: iget: root inode unallocated [ 683.304281][T15128] EXT4-fs (loop3): get root inode failed [ 683.310308][T15128] EXT4-fs (loop3): mount failed 02:17:41 executing program 2: bpf$BPF_MAP_GET_FD_BY_ID(0x2, 0x0, 0x0) 02:17:41 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000000)) [ 683.541962][T15138] EXT4-fs warning (device loop5): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 683.651808][T15138] EXT4-fs (loop5): mount failed 02:17:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:17:42 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4}}]}}, &(0x7f00000001c0)=""/162, 0x32, 0xa2, 0x110001}, 0x20) 02:17:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f0000000000000100800000", 0x1f, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:17:42 executing program 2: socketpair(0x22, 0x0, 0x9, &(0x7f0000000100)) 02:17:42 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000040)="640f21f3f20f2b2b26d9784a0f01c3d93926670fa80f3266b83d0000000f23280f21f86635000000040f23f826df1dbaa10066b8ef8dc56d66ef", 0x3a}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000100)={0xa0003}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40010c00004cf]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 684.315206][T15155] EXT4-fs error (device loop3): ext4_fill_super:4709: inode #2: comm syz-executor.3: iget: root inode unallocated [ 684.376561][T15155] EXT4-fs (loop3): get root inode failed [ 684.382509][T15155] EXT4-fs (loop3): mount failed 02:17:42 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000000140)=""/149, 0x2e, 0x95, 0x1}, 0x20) 02:17:42 executing program 2: perf_event_open$cgroup(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:17:42 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)="e1", 0x1}], 0x1}, 0x0) [ 684.484527][T15161] EXT4-fs warning (device loop5): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 684.502984][T15161] EXT4-fs (loop5): mount failed 02:17:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f0000000000000100800000", 0x1f, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:17:43 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000040)="640f21f3f20f2b2b26d9784a0f01c3d93926670fa80f3266b83d0000000f23280f21f86635000000040f23f826df1dbaa10066b8ef8dc56d66ef", 0x3a}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000100)={0xa0003}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40010c00004cf]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:17:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:17:43 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001200)={0xb0273faaa1425635, 0x9, &(0x7f0000000080)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 02:17:43 executing program 2: socketpair(0x11, 0xa, 0x0, &(0x7f0000001780)) 02:17:43 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000001400)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000800)={&(0x7f0000000280)=@id, 0x10, 0x0}, 0x0) [ 685.247361][T15182] EXT4-fs warning (device loop5): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 685.271933][T15182] EXT4-fs (loop5): mount failed 02:17:43 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000040)="640f21f3f20f2b2b26d9784a0f01c3d93926670fa80f3266b83d0000000f23280f21f86635000000040f23f826df1dbaa10066b8ef8dc56d66ef", 0x3a}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000100)={0xa0003}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40010c00004cf], 0x17001}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 02:17:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400", 0x2e, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 685.459882][T15186] EXT4-fs error (device loop3): ext4_fill_super:4709: inode #2: comm syz-executor.3: iget: root inode unallocated [ 685.547586][T15186] EXT4-fs (loop3): get root inode failed [ 685.553387][T15186] EXT4-fs (loop3): mount failed 02:17:44 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x1}}]}}, &(0x7f00000001c0)=""/162, 0x32, 0xa2, 0x110001}, 0x20) 02:17:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) [ 685.940079][T15201] EXT4-fs error (device loop5): ext4_ext_check_inode:459: inode #3: comm syz-executor.5: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 685.974737][T15201] EXT4-fs error (device loop5): ext4_quota_enable:6125: comm syz-executor.5: Bad quota inode # 3 [ 685.990747][T15201] EXT4-fs warning (device loop5): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. 02:17:44 executing program 1: bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) 02:17:44 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, 0x0, 0x0) [ 686.032316][T15201] EXT4-fs (loop5): mount failed 02:17:44 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000040)="640f21f3f20f2b2b26d9784a0f01c3d93926670fa80f3266b83d0000000f23280f21f86635000000040f23f826df1dbaa10066b8ef8dc56d66ef", 0x3a}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000100)={0xa0003}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40010c00004cf], 0x17001}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 02:17:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400", 0x2e, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:17:44 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x0, 0x0, 0x0, 0x400}, 0x40) [ 686.678092][T15214] EXT4-fs error (device loop3): ext4_fill_super:4709: inode #2: comm syz-executor.3: iget: root inode unallocated 02:17:45 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001680)='./cgroup.net/syz1\x00', 0x200002, 0x0) [ 686.792469][T15214] EXT4-fs (loop3): get root inode failed [ 686.798597][T15214] EXT4-fs (loop3): mount failed 02:17:45 executing program 4: bpf$BPF_MAP_GET_FD_BY_ID(0x16, 0x0, 0x0) 02:17:45 executing program 2: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={0x0, 0x0, 0x8}, 0x10) 02:17:45 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000040)="640f21f3f20f2b2b26d9784a0f01c3d93926670fa80f3266b83d0000000f23280f21f86635000000040f23f826df1dbaa10066b8ef8dc56d66ef", 0x3a}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000100)={0xa0003}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40010c00004cf], 0x17001}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 02:17:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:17:45 executing program 1: socketpair(0xf, 0x0, 0x0, &(0x7f0000001440)) [ 687.322604][T15231] EXT4-fs error (device loop5): ext4_ext_check_inode:459: inode #3: comm syz-executor.5: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 687.379178][T15237] EXT4-fs error (device loop3): ext4_fill_super:4709: inode #2: comm syz-executor.3: iget: root inode unallocated [ 687.468800][T15237] EXT4-fs (loop3): get root inode failed [ 687.474774][T15237] EXT4-fs (loop3): mount failed 02:17:45 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001440)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'bridge_slave_0\x00'}) [ 687.527548][T15231] EXT4-fs error (device loop5): ext4_quota_enable:6125: comm syz-executor.5: Bad quota inode # 3 [ 687.653819][T15231] EXT4-fs warning (device loop5): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 687.774179][T15231] EXT4-fs (loop5): mount failed 02:17:46 executing program 2: bpf$MAP_CREATE(0x2, &(0x7f0000000040), 0x40) 02:17:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:17:46 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000000040), 0x40) 02:17:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400", 0x2e, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:17:46 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 02:17:46 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x1}}, @var={0x8}]}}, &(0x7f00000001c0)=""/162, 0x42, 0xa2, 0x110001}, 0x20) 02:17:46 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000b00)=ANY=[@ANYRESDEC, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00M'], &(0x7f0000000100)='syzkaller\x00', 0x5, 0xdd, &(0x7f0000000140)=""/221, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 688.438247][T15260] EXT4-fs error (device loop3): ext4_fill_super:4709: inode #2: comm syz-executor.3: iget: root inode unallocated [ 688.543133][T15260] EXT4-fs (loop3): get root inode failed [ 688.549145][T15260] EXT4-fs (loop3): mount failed 02:17:47 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000015c00)={0x0, 0x0, 0x0}, 0x0) 02:17:47 executing program 4: bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000004e00)={0xffffffffffffffff, 0x0, 0x0}, 0x20) [ 688.768057][T15265] EXT4-fs error (device loop5): ext4_ext_check_inode:459: inode #3: comm syz-executor.5: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) 02:17:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:17:47 executing program 1: bpf$MAP_CREATE(0x4, 0x0, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) [ 688.947786][T15265] EXT4-fs error (device loop5): ext4_quota_enable:6125: comm syz-executor.5: Bad quota inode # 3 [ 689.039097][T15265] EXT4-fs warning (device loop5): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. 02:17:47 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)={0x11, 0x0, 0x0, 0x1ff}, 0x40) [ 689.144768][T15265] EXT4-fs (loop5): mount failed 02:17:47 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f00000002c0)="da", 0x1}, {&(0x7f0000000340)="14", 0x1}, {&(0x7f00000003c0)="83", 0x1}], 0x3}, 0x0) [ 689.426684][T15281] EXT4-fs error (device loop3): ext4_fill_super:4709: inode #2: comm syz-executor.3: iget: root inode unallocated 02:17:47 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd, 0xd, 0x2, [@datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], "92"}]}}, &(0x7f0000000300)=""/252, 0x2a, 0xfc, 0x1}, 0x20) [ 689.501139][T15281] EXT4-fs (loop3): get root inode failed [ 689.507715][T15281] EXT4-fs (loop3): mount failed 02:17:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004000000000000000000", 0x36, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:17:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:17:48 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000080)=@framed={{}, [@generic={0x9}]}, &(0x7f0000000100)='syzkaller\x00', 0x6, 0x9f, &(0x7f0000000140)=""/159, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 690.271955][T15296] EXT4-fs error (device loop5): ext4_ext_check_inode:459: inode #3: comm syz-executor.5: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) 02:17:48 executing program 4: socketpair(0x27, 0x0, 0x0, &(0x7f0000000540)) 02:17:48 executing program 2: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000000)=@nfc, 0x80, &(0x7f0000000340)=[{&(0x7f0000000080)="e1", 0x1}], 0x1}, 0x4040000) 02:17:48 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000000)=@nfc, 0x80, &(0x7f0000000340)=[{&(0x7f0000000080)="e1", 0x1}], 0x1}, 0x0) [ 690.430254][T15296] EXT4-fs error (device loop5): ext4_quota_enable:6125: comm syz-executor.5: Bad quota inode # 3 [ 690.483297][T15296] EXT4-fs warning (device loop5): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. 02:17:48 executing program 1: socketpair(0x2b, 0x0, 0x0, &(0x7f0000000500)) [ 690.589152][T15296] EXT4-fs (loop5): mount failed [ 690.764716][T15303] EXT4-fs error (device loop3): ext4_fill_super:4709: inode #2: comm syz-executor.3: iget: root inode unallocated [ 690.899950][T15303] EXT4-fs (loop3): get root inode failed [ 690.906376][T15303] EXT4-fs (loop3): mount failed 02:17:49 executing program 4: bpf$BPF_MAP_GET_FD_BY_ID(0x1d, 0x0, 0x0) 02:17:49 executing program 2: perf_event_open$cgroup(&(0x7f0000001180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:17:49 executing program 0: perf_event_open(&(0x7f00000010c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x208}, 0x0, 0x0, 0xffffffffffffffff, 0x8) 02:17:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004000000000000000000", 0x36, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:17:49 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x42000, 0x0) 02:17:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf465", 0xf, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) [ 691.503588][T15323] EXT4-fs error (device loop5): ext4_ext_check_inode:459: inode #3: comm syz-executor.5: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) 02:17:49 executing program 2: bpf$MAP_CREATE(0xe, &(0x7f0000000040), 0x40) 02:17:50 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000002580)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48) r2 = socket$kcm(0x2, 0x200000000000001, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000380)="480a3f990420a589fd099349a66e3f97479ca52f7dd707d3830b9b79de43d179a22acc5dc0b2864745bdf3ff99d06647b0c910728b17f6c54c1e5453e89c11b97dbb8d9007748e284e8487a7151312352a1be38c3b8bdc0818f519224021ddede1aed515d6135888cdfc39a4ce8c99a1608db69edd3f557e6127fe456aada91239bd63dd9b2678d834c37c60a4860e4ccc974f12882487e834327f38e389d885e5b243d72941b95f231354d4832e1a1eee73729460617b96e8ae638a9f42a6eb87469257a97bdb938b8022299e613499d44d93127f1e6e52", 0xd8}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="b800000000000000110100000800000006c79a9d5d22e73be5e508f5bffea4d5e5de2378c3516539784fd1c8bc1aaaad0e3e956d44432f2424253ba3a67189486c4533cb0bae8182c35269604093a14399f45e6a97c925abe797c44f97b86086f0be66050b19c342245585f90e2605dab253f6b388ec127565f8eacc75080f15d64f1e41849f735911d854a1e1d3a0fb49212db3be46a90b4b1838407364c62e249e7259fddaee451ac16de7592d27879300000000000000b80000000000000007010000ffffffffe65847ac5040b93b1b3816c6aff2ed91fd1763230791b20348950bc5073d6dceee572f07a4ced111e1f07c43c7adf444f6ec93bbf719db1d651511284665b052b42931c139c78062e3c976367ec2fafdeb8b69f005bf07903cb7077a31ba1ca3f31638e2e410a4ddf72708e16ee3118908a412147c26bf1ef2ce3c404cd2dc6336f9ee7f87e0bf39a104e1aa6c6bf897a50a5aafb3f5fddc7d3a9978899f87b4937b3d5453711900b00000000000000003010000fa0e000026e981e997544e1f2c6d7a12316726b89f35a4889dc325cdeec6e60619d79bae77afacf7227db3af903a7ba0273d4da55b5bea169ce2d083244cfcbdd4084d3c716b0aa80f6212cc03f59f669210b0601916b7b86d7102b3af9513cc7c698762cb3eb32bcf7c99915c97a1501c9d5a090e8ed8445bf211e65893bd8ff78cb963a1791c6523610fea95545c72ff2c3275917e2f11cef48df04d00000002000000c0000000000000001100000002000000a8c08b4c1c438299ec67bfa6a70220c7bff5bbf324066fcad8cd91703bd8339da3d0a226b57511300d0f72969126a325ec35ff91cbee2782eaa20c801f69b125ba69d3d8741545e6d0690f26fb5b50a0e142bc24a744df9f18d3358105eef1cf3cde63b67f4205a5477b14b352bc9eacd24ed1cc9ef0f42a95bddf75644d0c79e7b7c2e84b09916c588f6243e1e243bb5a79a4410619f07a0e416ad74103c5f2b43c47c9674874e3b41d5af800000000180000000000000000000000f7000000c66c6dc300000000be2f70d79fb7ea2e561dc41d637bbc4273d5a08db937bb73ced5e5a13496d1f38edb31a7f53c33b7dc10da98183c903ecaf9609151481a2d2747258a7ad92321"], 0x2f8}, 0x4008080) sendmsg$inet(r2, &(0x7f0000000fc0)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000040)={r2, r1}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(r0, &(0x7f0000000a80)={0x0, 0x7fe5, &(0x7f0000000a00)=[{&(0x7f0000000280)="04", 0x140000}], 0x2}, 0x20000) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000002c0), 0x8) sendmsg$kcm(r3, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000300)="aeb5b7d1add43b99aa0dc856a04247d9", 0x10}, {&(0x7f0000000340)="73ab060508429fcc21fb7b06b0f8cdc3fce6bfd39be65808386a53eb3864e8b90f4785b198e21233b556a15b5cbc637df0055b7b5cbe", 0x36}, {&(0x7f00000004c0)="7ab44dc6408c54f1f2977faa208e09f7aab2bd320cb3755e319d5f43db929402e84be6e8a800eff33f6a8577e3b86f00c7d19ddb827d1e396ed6e389bc20a8380c96f6083b4cd6fca33855c008c596ce338b96f1ffa40bf479cd84dc3535ccfe72bf19523fbd29de494eaf90914d7b7e41e25bd00358273bf57e42fff294ccc3011ce0cda9a32163c2b5f0c64347145e8724829f5d4b7c9fc66283c342a9dc09bf8d8ce0d7dc6bb86bf2c18768ed55", 0xaf}], 0x3, &(0x7f0000000640)=[{0x40, 0x105, 0x0, "46093fbae0b0e896f8e1e8545bccf54025aa502a4cc9ff5d28df85aacc43eb2e4dcc823370916ca9a7bf3393a4eb30"}, {0xd0, 0x118, 0xfffffff8, "1b53c660e35039a6e7f2993f07903136115b8a84191812908d915dd8735fdde33035e46a9a7e57bad43b0af34ed1872206bac4793063b934efcfbdecae9229bff4d331c0fcca25fdab02a6c0ea9951b44e849dc3400ef6e32b6b8382cce882db7166c141979e4db86b7ac5ae4c7a5a22a8f628c42d5b169c8c62d15b5c60884cfd82b57e6a49f079306fc600877f3016819ced010425e11904d6d6ca7b72829b5b2505c3ead26cc475f77140200d41b32571317fd849d08b24"}], 0x110}, 0xd0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000}, 0x11484, 0x0, 0x0, 0x2, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) mkdirat$cgroup(r4, &(0x7f0000000380)='syz1\x00', 0x1ff) write$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="e05e72d0f2d0f0606b6652278ef7595190ab0883bea71006920a0b7289", @ANYRESOCT=r4], 0x12) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r4) socket$kcm(0x29, 0xa, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f0000000580)=@nfc, 0x80, &(0x7f0000000c00)=[{&(0x7f0000001000)=""/4096, 0x1000}, {&(0x7f00000003c0)}, {&(0x7f0000000780)=""/240, 0xf0}, {&(0x7f0000000b80)=""/88, 0x58}], 0x4, &(0x7f0000000900)=""/5, 0x5}, 0x102) syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/pid_for_children\x00') [ 691.650492][T15323] EXT4-fs error (device loop5): ext4_quota_enable:6125: comm syz-executor.5: Bad quota inode # 3 [ 691.728732][T15323] EXT4-fs warning (device loop5): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 691.821298][T15323] EXT4-fs (loop5): mount failed 02:17:50 executing program 0: bpf$BPF_MAP_GET_FD_BY_ID(0x10, 0x0, 0x1c) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) 02:17:50 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000000)={r1}) [ 692.203667][T15334] EXT4-fs error (device loop3): ext4_fill_super:4709: inode #2: comm syz-executor.3: iget: root inode unallocated 02:17:50 executing program 0: perf_event_open$cgroup(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x98800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2004}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 692.338256][T15334] EXT4-fs (loop3): get root inode failed [ 692.345577][T15334] EXT4-fs (loop3): mount failed 02:17:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004000000000000000000", 0x36, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:17:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000140)=""/178, 0xa1, 0xb2, 0x1}, 0x20) 02:17:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf465", 0xf, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:17:51 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000002580)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48) r2 = socket$kcm(0x2, 0x200000000000001, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000380)="480a3f990420a589fd099349a66e3f97479ca52f7dd707d3830b9b79de43d179a22acc5dc0b2864745bdf3ff99d06647b0c910728b17f6c54c1e5453e89c11b97dbb8d9007748e284e8487a7151312352a1be38c3b8bdc0818f519224021ddede1aed515d6135888cdfc39a4ce8c99a1608db69edd3f557e6127fe456aada91239bd63dd9b2678d834c37c60a4860e4ccc974f12882487e834327f38e389d885e5b243d72941b95f231354d4832e1a1eee73729460617b96e8ae638a9f42a6eb87469257a97bdb938b8022299e613499d44d93127f1e6e52", 0xd8}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], 0x2f8}, 0x4008080) sendmsg$inet(r2, &(0x7f0000000fc0)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000040)={r2, r1}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(r0, &(0x7f0000000a80)={0x0, 0x7fe5, &(0x7f0000000a00)=[{&(0x7f0000000280)="04", 0x140000}], 0x2}, 0x20000) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000002c0), 0x8) sendmsg$kcm(r3, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000300)="aeb5b7d1add43b99aa0dc856a04247d9", 0x10}, {&(0x7f0000000340)="73ab060508429fcc21fb7b06b0f8cdc3fce6bfd39be65808386a53eb3864e8b90f4785b198e21233b556a15b5cbc637df0055b7b5cbe", 0x36}, {&(0x7f00000004c0)="7ab44dc6408c54f1f2977faa208e09f7aab2bd320cb3755e319d5f43db929402e84be6e8a800eff33f6a8577e3b86f00c7d19ddb827d1e396ed6e389bc20a8380c96f6083b4cd6fca33855c008c596ce338b96f1ffa40bf479cd84dc3535ccfe72bf19523fbd29de494eaf90914d7b7e41e25bd00358273bf57e42fff294ccc3011ce0cda9a32163c2b5f0c64347145e8724829f5d4b7c9fc66283c342a9dc09bf8d8ce0d7dc6bb86bf2c18768ed55", 0xaf}], 0x3, &(0x7f0000000640)=[{0x40, 0x105, 0x0, "46093fbae0b0e896f8e1e8545bccf54025aa502a4cc9ff5d28df85aacc43eb2e4dcc823370916ca9a7bf3393a4eb30"}, {0xd0, 0x118, 0xfffffff8, "1b53c660e35039a6e7f2993f07903136115b8a84191812908d915dd8735fdde33035e46a9a7e57bad43b0af34ed1872206bac4793063b934efcfbdecae9229bff4d331c0fcca25fdab02a6c0ea9951b44e849dc3400ef6e32b6b8382cce882db7166c141979e4db86b7ac5ae4c7a5a22a8f628c42d5b169c8c62d15b5c60884cfd82b57e6a49f079306fc600877f3016819ced010425e11904d6d6ca7b72829b5b2505c3ead26cc475f77140200d41b32571317fd849d08b24"}], 0x110}, 0xd0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000}, 0x11484, 0x0, 0x0, 0x2, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) mkdirat$cgroup(r4, &(0x7f0000000380)='syz1\x00', 0x1ff) write$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="e05e72d0f2d0f0606b6652278ef7595190ab0883bea71006920a0b7289", @ANYRESOCT=r4], 0x12) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r4) socket$kcm(0x29, 0xa, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f0000000580)=@nfc, 0x80, &(0x7f0000000c00)=[{&(0x7f0000001000)=""/4096, 0x1000}, {&(0x7f00000003c0)}, {&(0x7f0000000780)=""/240, 0xf0}, {&(0x7f0000000b80)=""/88, 0x58}], 0x4, &(0x7f0000000900)=""/5, 0x5}, 0x102) syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/pid_for_children\x00') 02:17:51 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000000c0)='#', 0x1}, {&(0x7f00000001c0)='K', 0x1}, {&(0x7f0000000280)='d', 0x1}], 0x3, &(0x7f0000000380)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x10}}], 0x28}, 0x0) 02:17:51 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) [ 692.954107][T15350] EXT4-fs error (device loop5): ext4_ext_check_inode:459: inode #3: comm syz-executor.5: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 693.129694][T15350] EXT4-fs error (device loop5): ext4_quota_enable:6125: comm syz-executor.5: Bad quota inode # 3 02:17:51 executing program 2: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) [ 693.178810][T15360] EXT4-fs error (device loop3): ext4_fill_super:4709: inode #2: comm syz-executor.3: iget: root inode unallocated [ 693.207031][T15360] EXT4-fs (loop3): get root inode failed [ 693.213057][T15360] EXT4-fs (loop3): mount failed 02:17:51 executing program 0: socketpair(0x3f, 0x0, 0x0, &(0x7f00000000c0)) [ 693.244912][T15350] EXT4-fs warning (device loop5): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 693.300206][T15350] EXT4-fs (loop5): mount failed 02:17:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf465", 0xf, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:17:51 executing program 1: bpf$ITER_CREATE(0x1d, &(0x7f0000000000), 0x8) 02:17:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:17:52 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=ANY=[@ANYRES32], &(0x7f0000000080)='GPL\x00', 0x7, 0x86, &(0x7f00000000c0)=""/134, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 693.996724][T15374] EXT4-fs error (device loop3): ext4_fill_super:4709: inode #2: comm syz-executor.3: iget: root inode unallocated 02:17:52 executing program 2: mkdir(&(0x7f000000be80)='./file0\x00', 0x0) 02:17:52 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000005440)="2e000000120081aee4050cecdb4cb9040a485e510befccd77f3e9cf0758ef9000600b0eba06ac400040000000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000003780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88a8ffff}, 0x0) recvmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x0) [ 694.104915][T15374] EXT4-fs (loop3): get root inode failed [ 694.111053][T15374] EXT4-fs (loop3): mount failed 02:17:52 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000300)}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x8, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000100)=@nl=@unspec={0x871f000000000000, 0x2a77, 0xfc90009}, 0x25a, &(0x7f0000000040)=[{&(0x7f0000000280), 0xff8f}], 0x1, &(0x7f0000001280)}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[], 0xda00) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000280)={0x0, r0}, 0x10) r6 = openat$cgroup_ro(r2, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r1) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='dax_writeback_one\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x40082406, &(0x7f0000000480)='cpuacct.usage_percpu_sys\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000340)={r4, r6, 0x16}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x3) perf_event_open$cgroup(&(0x7f0000000380)={0x2, 0x70, 0x5, 0x0, 0x9, 0x56, 0x0, 0xffffffffffffffff, 0x4003, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x7fffffff, 0x8000}, 0x0, 0xca3, 0x6, 0x5, 0x6, 0x7ff, 0x8}, r3, 0xe, 0xffffffffffffffff, 0x0) 02:17:52 executing program 4: recvmsg(0xffffffffffffffff, &(0x7f0000005d40)={&(0x7f0000004b00)=@can={0x1d, 0x0}, 0x80, &(0x7f0000005d00)=[{&(0x7f0000004b80)=""/228, 0xe4}, {&(0x7f0000004c80)=""/99, 0x63}, {&(0x7f0000004d00)=""/4096, 0x1000}], 0x3}, 0x40002060) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000005d80), 0x4) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000005dc0)={0x9, 0x9, 0x80000000, 0x7fffffff, 0x20, 0x1, 0x7, [], r0, r1, 0x4, 0x2, 0x4}, 0x40) bpf$MAP_CREATE(0x0, &(0x7f0000005e00)={0x1c, 0x100000, 0xdec, 0x1ff, 0x0, r2, 0xbe9, [], r0, 0xffffffffffffffff, 0x3, 0x0, 0x4}, 0x40) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000005e80)={r2, 0x28, &(0x7f0000005e40)}, 0x10) mkdir(&(0x7f000000be80)='./file0\x00', 0x154) [ 694.374103][T15387] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.0'. [ 694.401233][T15383] EXT4-fs error (device loop5): ext4_ext_check_inode:459: inode #3: comm syz-executor.5: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 694.549908][T15383] EXT4-fs error (device loop5): ext4_quota_enable:6125: comm syz-executor.5: Bad quota inode # 3 [ 694.562602][T15383] EXT4-fs warning (device loop5): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 694.581020][T15387] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.0'. [ 694.669605][T15383] EXT4-fs (loop5): mount failed 02:17:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000", 0x16, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:17:53 executing program 0: bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) unlink(&(0x7f0000001a80)='./file0\x00') socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000034c0)) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) 02:17:53 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x1000000, 0x0, 0x1}, 0x40) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) 02:17:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:17:53 executing program 4: [ 695.733723][T15402] EXT4-fs error (device loop3): ext4_fill_super:4709: inode #2: comm syz-executor.3: iget: root inode unallocated [ 695.873263][T15402] EXT4-fs (loop3): get root inode failed [ 695.879340][T15402] EXT4-fs (loop3): mount failed 02:17:54 executing program 0: [ 696.052634][T15409] EXT4-fs error (device loop5): ext4_ext_check_inode:459: inode #3: comm syz-executor.5: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 696.110805][T15409] EXT4-fs error (device loop5): ext4_quota_enable:6125: comm syz-executor.5: Bad quota inode # 3 [ 696.192463][T15409] EXT4-fs warning (device loop5): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 696.239515][T15409] EXT4-fs (loop5): mount failed 02:17:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000", 0x16, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:17:54 executing program 4: 02:17:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 696.882522][T15423] EXT4-fs error (device loop3): ext4_fill_super:4709: inode #2: comm syz-executor.3: iget: root inode unallocated 02:17:55 executing program 0: [ 697.036583][T15423] EXT4-fs (loop3): get root inode failed [ 697.042570][T15423] EXT4-fs (loop3): mount failed [ 697.516540][ T31] audit: type=1800 audit(1605061075.903:8): pid=15393 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="memory.events" dev="sda1" ino=16381 res=0 errno=0 [ 697.628694][T15430] EXT4-fs error (device loop5): ext4_ext_check_inode:459: inode #3: comm syz-executor.5: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 697.779533][T15430] EXT4-fs error (device loop5): ext4_quota_enable:6125: comm syz-executor.5: Bad quota inode # 3 [ 697.820114][T15430] EXT4-fs warning (device loop5): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 697.860468][T15430] EXT4-fs (loop5): mount failed 02:17:56 executing program 1: 02:17:56 executing program 4: 02:17:56 executing program 2: 02:17:56 executing program 0: 02:17:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000", 0x16, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:17:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004000000000000000000000002000000", 0x3c, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 698.193025][T15438] EXT4-fs error (device loop3): ext4_fill_super:4709: inode #2: comm syz-executor.3: iget: root inode unallocated 02:17:56 executing program 2: [ 698.346525][T15438] EXT4-fs (loop3): get root inode failed [ 698.352488][T15438] EXT4-fs (loop3): mount failed 02:17:56 executing program 4: [ 698.418537][T15445] EXT4-fs error (device loop5): ext4_ext_check_inode:459: inode #3: comm syz-executor.5: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) 02:17:56 executing program 0: [ 698.468836][T15445] EXT4-fs error (device loop5): ext4_quota_enable:6125: comm syz-executor.5: Bad quota inode # 3 [ 698.495086][T15445] EXT4-fs warning (device loop5): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 698.512994][T15445] EXT4-fs (loop5): mount failed 02:17:57 executing program 1: 02:17:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000", 0x1a, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:17:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004000000000000000000000002000000", 0x3c, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:17:57 executing program 2: 02:17:57 executing program 0: 02:17:57 executing program 4: 02:17:57 executing program 1: [ 699.248528][T15456] EXT4-fs error (device loop5): ext4_ext_check_inode:459: inode #3: comm syz-executor.5: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 699.293847][T15456] EXT4-fs error (device loop5): ext4_quota_enable:6125: comm syz-executor.5: Bad quota inode # 3 [ 699.344466][T15456] EXT4-fs warning (device loop5): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 699.376171][T15460] EXT4-fs error (device loop3): ext4_fill_super:4709: inode #2: comm syz-executor.3: iget: root inode unallocated [ 699.391474][T15456] EXT4-fs (loop5): mount failed [ 699.479974][T15460] EXT4-fs (loop3): get root inode failed [ 699.486336][T15460] EXT4-fs (loop3): mount failed 02:17:57 executing program 2: 02:17:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004000000000000000000000002000000", 0x3c, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:17:58 executing program 1: 02:17:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000", 0x1a, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:17:58 executing program 4: 02:17:58 executing program 0: 02:17:58 executing program 2: 02:17:58 executing program 1: [ 700.457217][T15475] EXT4-fs error (device loop5): ext4_ext_check_inode:459: inode #3: comm syz-executor.5: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 700.540265][T15477] EXT4-fs error (device loop3): ext4_fill_super:4709: inode #2: comm syz-executor.3: iget: root inode unallocated 02:17:59 executing program 4: [ 700.595575][T15477] EXT4-fs (loop3): get root inode failed [ 700.601659][T15477] EXT4-fs (loop3): mount failed [ 700.614511][T15475] EXT4-fs error (device loop5): ext4_quota_enable:6125: comm syz-executor.5: Bad quota inode # 3 [ 700.679751][T15475] EXT4-fs warning (device loop5): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. 02:17:59 executing program 0: [ 700.793748][T15475] EXT4-fs (loop5): mount failed 02:17:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000", 0x1a, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:17:59 executing program 2: 02:17:59 executing program 1: 02:17:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:17:59 executing program 0: 02:17:59 executing program 4: [ 701.384643][T15490] EXT4-fs error (device loop3): ext4_fill_super:4709: inode #2: comm syz-executor.3: iget: root inode unallocated 02:17:59 executing program 1: [ 701.506109][T15490] EXT4-fs (loop3): get root inode failed [ 701.511989][T15490] EXT4-fs (loop3): mount failed 02:18:00 executing program 2: [ 701.784031][T15499] EXT4-fs error (device loop5): ext4_quota_enable:6125: comm syz-executor.5: Bad quota inode # 3 02:18:00 executing program 0: 02:18:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400", 0x1c, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) [ 701.892928][T15499] EXT4-fs warning (device loop5): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 702.002635][T15499] EXT4-fs (loop5): mount failed 02:18:00 executing program 2: 02:18:00 executing program 4: 02:18:00 executing program 1: 02:18:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 702.369890][T15509] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 702.378142][T15509] EXT4-fs (loop3): mount failed 02:18:00 executing program 0: 02:18:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400", 0x1c, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:18:01 executing program 2: 02:18:01 executing program 4: [ 702.880321][T15518] EXT4-fs error (device loop5): ext4_quota_enable:6125: comm syz-executor.5: Bad quota inode # 3 [ 702.916987][T15518] EXT4-fs warning (device loop5): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. 02:18:01 executing program 0: [ 702.982757][T15518] EXT4-fs (loop5): mount failed 02:18:01 executing program 1: [ 703.262152][T15526] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 703.268978][T15526] EXT4-fs (loop3): mount failed 02:18:01 executing program 4: 02:18:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400", 0x1c, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:18:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:18:01 executing program 2: 02:18:01 executing program 0: 02:18:02 executing program 1: 02:18:02 executing program 0: [ 703.895562][T15538] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 703.902475][T15538] EXT4-fs (loop3): mount failed 02:18:02 executing program 2: [ 703.981106][T15539] EXT4-fs error (device loop5): ext4_quota_enable:6125: comm syz-executor.5: Bad quota inode # 3 02:18:02 executing program 4: [ 704.162662][T15539] EXT4-fs warning (device loop5): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. 02:18:02 executing program 2: 02:18:02 executing program 1: [ 704.301074][T15539] EXT4-fs (loop5): mount failed 02:18:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:18:02 executing program 0: 02:18:03 executing program 4: 02:18:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 704.772649][T15554] EXT4-fs error (device loop3): ext4_fill_super:4709: inode #2: comm syz-executor.3: iget: root inode unallocated 02:18:03 executing program 1: 02:18:03 executing program 2: [ 704.906354][T15554] EXT4-fs (loop3): get root inode failed [ 704.912128][T15554] EXT4-fs (loop3): mount failed 02:18:03 executing program 0: 02:18:03 executing program 4: 02:18:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) [ 705.319786][T15564] EXT4-fs error (device loop5): ext4_fill_super:4709: inode #2: comm syz-executor.5: iget: root inode unallocated 02:18:03 executing program 0: [ 705.454523][T15564] EXT4-fs (loop5): get root inode failed [ 705.460604][T15564] EXT4-fs (loop5): mount failed 02:18:03 executing program 1: 02:18:04 executing program 2: [ 705.598537][T15569] EXT4-fs error (device loop3): ext4_fill_super:4709: inode #2: comm syz-executor.3: iget: root inode unallocated [ 705.650523][T15569] EXT4-fs (loop3): get root inode failed [ 705.658981][T15569] EXT4-fs (loop3): mount failed 02:18:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:18:04 executing program 4: 02:18:04 executing program 0: 02:18:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:18:04 executing program 2: 02:18:04 executing program 1: [ 706.290848][T15580] EXT4-fs error (device loop5): ext4_fill_super:4709: inode #2: comm syz-executor.5: iget: root inode unallocated [ 706.394431][T15580] EXT4-fs (loop5): get root inode failed [ 706.400633][T15580] EXT4-fs (loop5): mount failed 02:18:04 executing program 4: 02:18:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:18:05 executing program 2: [ 706.937741][T15590] EXT4-fs error (device loop3): ext4_fill_super:4709: inode #2: comm syz-executor.3: iget: root inode unallocated 02:18:05 executing program 2: 02:18:05 executing program 1: [ 707.079510][T15590] EXT4-fs (loop3): get root inode failed [ 707.085245][T15590] EXT4-fs (loop3): mount failed 02:18:05 executing program 0: 02:18:05 executing program 4: [ 707.272658][T15597] EXT4-fs error (device loop5): ext4_fill_super:4709: inode #2: comm syz-executor.5: iget: root inode unallocated [ 707.289247][T15597] EXT4-fs (loop5): get root inode failed [ 707.296388][T15597] EXT4-fs (loop5): mount failed 02:18:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:18:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:18:06 executing program 1: 02:18:06 executing program 2: [ 707.790654][T15608] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 707.800792][T15608] EXT4-fs (loop3): group descriptors corrupted! 02:18:06 executing program 0: 02:18:06 executing program 4: [ 708.053547][T15612] EXT4-fs error (device loop5): ext4_fill_super:4709: inode #2: comm syz-executor.5: iget: root inode unallocated 02:18:06 executing program 4: [ 708.193847][T15612] EXT4-fs (loop5): get root inode failed [ 708.200155][T15612] EXT4-fs (loop5): mount failed 02:18:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:18:06 executing program 0: 02:18:06 executing program 2: 02:18:06 executing program 1: 02:18:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 708.709043][T15624] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 708.719316][T15624] EXT4-fs (loop3): group descriptors corrupted! 02:18:07 executing program 4: 02:18:07 executing program 2: 02:18:07 executing program 0: [ 709.202624][T15631] EXT4-fs error (device loop5): ext4_fill_super:4709: inode #2: comm syz-executor.5: iget: root inode unallocated 02:18:07 executing program 2: 02:18:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:18:07 executing program 1: 02:18:07 executing program 4: [ 709.380647][T15631] EXT4-fs (loop5): get root inode failed [ 709.386737][T15631] EXT4-fs (loop5): mount failed 02:18:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 709.897798][T15641] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 709.907872][T15641] EXT4-fs (loop3): group descriptors corrupted! 02:18:08 executing program 1: 02:18:08 executing program 0: 02:18:08 executing program 2: 02:18:08 executing program 4: 02:18:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {0x0, 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) [ 710.454152][T15649] EXT4-fs error (device loop5): ext4_fill_super:4709: inode #2: comm syz-executor.5: iget: root inode unallocated [ 710.574952][T15649] EXT4-fs (loop5): get root inode failed [ 710.580968][T15649] EXT4-fs (loop5): mount failed 02:18:09 executing program 4: 02:18:09 executing program 2: 02:18:09 executing program 1: 02:18:09 executing program 0: 02:18:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 710.967085][T15657] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 710.977201][T15657] EXT4-fs (loop3): group descriptors corrupted! 02:18:09 executing program 2: 02:18:09 executing program 1: [ 711.319146][T15665] EXT4-fs error (device loop5): ext4_fill_super:4709: inode #2: comm syz-executor.5: iget: root inode unallocated 02:18:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {0x0, 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:18:09 executing program 4: [ 711.459189][T15665] EXT4-fs (loop5): get root inode failed [ 711.464991][T15665] EXT4-fs (loop5): mount failed 02:18:10 executing program 0: 02:18:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:18:10 executing program 2: 02:18:10 executing program 1: [ 711.940308][T15674] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 711.950626][T15674] EXT4-fs (loop3): group descriptors corrupted! 02:18:10 executing program 1: 02:18:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, "9efa620a9c14898b", "0a1a555d81566a270fe9bf3bb290a624ad90b07703c9caf6d56449a61b4b26d7", "7e3b8382", "e5d7c972fee205f7"}, 0x38) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 02:18:10 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000001500)={&(0x7f0000000080), 0x10, 0x0}, 0x0) 02:18:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {0x0, 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) [ 712.358125][T15682] EXT4-fs error (device loop5): ext4_fill_super:4709: inode #2: comm syz-executor.5: iget: root inode unallocated [ 712.435032][T15682] EXT4-fs (loop5): get root inode failed [ 712.441233][T15682] EXT4-fs (loop5): mount failed [ 712.611812][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:18:11 executing program 2: r0 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video0\x00', 0x2, 0x0) ioctl$VIDIOC_QBUF(r0, 0xc0205647, &(0x7f00000001c0)={0x0, 0x9, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "792bf0b5"}, 0x0, 0x0, @planes=0x0}) 02:18:11 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1c}, 0x40) 02:18:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 712.950013][T15695] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 712.960335][T15695] EXT4-fs (loop3): group descriptors corrupted! 02:18:11 executing program 0: bpf$MAP_CREATE(0x9, &(0x7f0000000080), 0x40) 02:18:11 executing program 1: r0 = socket$tipc(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x4}}, 0x10) 02:18:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:18:11 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x101, 0x60000) read$usbfs(r0, 0x0, 0x0) 02:18:12 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_DEBUG={0x8}]}, 0xffffffffffffff35}}, 0x0) [ 713.646524][T15715] EXT4-fs error (device loop5): ext4_fill_super:4709: inode #2: comm syz-executor.5: iget: root inode unallocated [ 713.726317][T15715] EXT4-fs (loop5): get root inode failed [ 713.732068][T15715] EXT4-fs (loop5): mount failed 02:18:12 executing program 1: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x8a, 0x0, 0x0) 02:18:12 executing program 0: r0 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video0\x00', 0x2, 0x0) ioctl$VIDIOC_QBUF(r0, 0x80805659, 0x0) 02:18:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf465", 0xf, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 714.010271][T15725] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 714.020368][T15725] EXT4-fs (loop3): group descriptors corrupted! 02:18:12 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000380)={'syztnl1\x00', 0x0}) 02:18:12 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000340)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB=']'], 0x14}}, 0x0) [ 714.404046][T15738] EXT4-fs error (device loop5): ext4_fill_super:4709: inode #2: comm syz-executor.5: iget: root inode unallocated [ 714.417443][T15738] EXT4-fs (loop5): get root inode failed [ 714.423163][T15738] EXT4-fs (loop5): mount failed 02:18:12 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000001500)={&(0x7f0000000080), 0x10, 0x0, 0x0, 0x0, 0x101d0}, 0x0) 02:18:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf465", 0xf, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:18:13 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:18:13 executing program 1: r0 = syz_open_dev$vim2m(&(0x7f0000000080)='/dev/video#\x00', 0xff, 0x2) ioctl$vim2m_VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f00000000c0)={0x0, @sliced}) 02:18:13 executing program 0: r0 = syz_open_dev$vim2m(&(0x7f0000000080)='/dev/video#\x00', 0xff, 0x2) ioctl$vim2m_VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f00000000c0)={0xa, @sliced}) 02:18:13 executing program 2: r0 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video0\x00', 0x2, 0x0) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f00000001c0)={0x0, 0x7, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "792bf0b5"}, 0x0, 0x0, @planes=0x0}) [ 715.090674][T15749] EXT4-fs error (device loop5): ext4_fill_super:4709: inode #2: comm syz-executor.5: iget: root inode unallocated [ 715.132603][T15749] EXT4-fs (loop5): get root inode failed [ 715.138684][T15749] EXT4-fs (loop5): mount failed [ 715.157875][T15755] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 715.168012][T15755] EXT4-fs (loop3): group descriptors corrupted! 02:18:13 executing program 0: bpf$MAP_CREATE(0x1d, &(0x7f0000000080), 0x40) 02:18:13 executing program 4: bpf$MAP_CREATE(0x11, &(0x7f0000000080), 0x40) 02:18:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf465", 0xf, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:18:14 executing program 1: r0 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video0\x00', 0x2, 0x0) ioctl$VIDIOC_QBUF(r0, 0xc050560f, 0x0) 02:18:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:18:14 executing program 2: syz_usb_connect$uac1(0x2, 0x97, &(0x7f0000000040)={{0x12, 0x1, 0x200, 0x0, 0x0, 0x0, 0x40, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x85, 0x3, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{}, [@mixer_unit={0x6, 0x24, 0x4, 0x2, 0x0, ')'}, @output_terminal={0x9}, @feature_unit={0xd, 0x24, 0x6, 0x0, 0x0, 0x3, [0x0, 0x0, 0x0]}, @extension_unit={0xa, 0x24, 0x8, 0x0, 0x0, 0x0, "fb729a"}]}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000140)={0xa}, 0x0, 0x0, 0x2, [{0x2, &(0x7f0000000240)=@string={0x2}}, {0xcc, &(0x7f0000000380)=@string={0xcc, 0x3, "e70a2686920750e3c8c8fb22140eae133eb4632bd80828374d51cc05535b9903cafad279300d4021be5dfabecba79308045362a3ce014e6573a4e7756b530db771953f4c677cca0a803f75cd3155ec1b12100b03375f0686f6077560f982d403be6152328146e96559cc14c793e238ca330648af3c66423d0970633100ec63502eeaeb03c6fedcddda59e7c46fc654d091f9bea3cc7cd0923a722ed56d6680ee607a21776774e6243944ffed5a4eec512d14db6bed63625e0886e732c2cc1fab2833a32be6d055db9c48"}}]}) 02:18:14 executing program 0: r0 = socket$tipc(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x1}}, 0x10) 02:18:14 executing program 4: syz_usb_connect$uac1(0x2, 0x97, &(0x7f0000000040)={{0x12, 0x1, 0x200, 0x0, 0x0, 0x0, 0x40, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x85, 0x3, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{}, [@mixer_unit={0x6, 0x24, 0x4, 0x2, 0x2, ')'}, @output_terminal={0x9}, @feature_unit={0xd, 0x24, 0x6, 0x0, 0x0, 0x3, [0x0, 0x0, 0x0]}, @extension_unit={0xa, 0x24, 0x8, 0x0, 0x0, 0x0, "fb729a"}]}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000140)={0xa}, 0x0, 0x0, 0x2, [{0x2, &(0x7f0000000240)=@string={0x2}}, {0xcc, &(0x7f0000000380)=@string={0xcc, 0x3, "e70a2686920750e3c8c8fb22140eae133eb4632bd80828374d51cc05535b9903cafad279300d4021be5dfabecba79308045362a3ce014e6573a4e7756b530db771953f4c677cca0a803f75cd3155ec1b12100b03375f0686f6077560f982d403be6152328146e96559cc14c793e238ca330648af3c66423d0970633100ec63502eeaeb03c6fedcddda59e7c46fc654d091f9bea3cc7cd0923a722ed56d6680ee607a21776774e6243944ffed5a4eec512d14db6bed63625e0886e732c2cc1fab2833a32be6d055db9c48"}}]}) [ 716.198935][T15775] EXT4-fs error (device loop5): ext4_fill_super:4709: inode #2: comm syz-executor.5: iget: root inode unallocated [ 716.204141][T15776] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 716.221212][T15776] EXT4-fs (loop3): group descriptors corrupted! 02:18:14 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/autofs\x00', 0x0, 0x0) ioctl$VIDIOC_QBUF(r0, 0x541b, 0x0) [ 716.294374][T15775] EXT4-fs (loop5): get root inode failed [ 716.300551][T15775] EXT4-fs (loop5): mount failed [ 716.456968][ T695] usb 3-1: new full-speed USB device number 11 using dummy_hcd 02:18:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f00", 0x10, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:18:15 executing program 0: bpf$MAP_CREATE(0x10, 0x0, 0x0) 02:18:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000", 0x16, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 716.746701][ T8943] usb 5-1: new full-speed USB device number 11 using dummy_hcd [ 716.787572][ T695] usb 3-1: not running at top speed; connect to a high speed hub [ 716.876807][ T695] usb 3-1: config 1 has an invalid descriptor of length 154, skipping remainder of the config [ 716.887428][ T695] usb 3-1: config 1 has 2 interfaces, different from the descriptor's value: 3 [ 716.897079][ T695] usb 3-1: config 1 has no interface number 1 [ 716.903351][ T695] usb 3-1: too many endpoints for config 1 interface 2 altsetting 0: 41, using maximum allowed: 30 [ 716.914650][ T695] usb 3-1: config 1 interface 2 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 41 02:18:15 executing program 1: mmap$usbfs(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x7, 0x30, 0xffffffffffffffff, 0x0) [ 716.948493][T15793] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (61595!=0) [ 716.958059][T15793] EXT4-fs (loop3): group descriptors corrupted! 02:18:15 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000002c0)='batadv\x00') sendmsg$BATADV_CMD_GET_HARDIF(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000440)={0x24, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x24}}, 0x0) [ 717.136260][ T8943] usb 5-1: not running at top speed; connect to a high speed hub [ 717.217999][ T8943] usb 5-1: config 1 has an invalid descriptor of length 154, skipping remainder of the config [ 717.229890][ T8943] usb 5-1: config 1 has 2 interfaces, different from the descriptor's value: 3 [ 717.239484][ T8943] usb 5-1: config 1 has no interface number 1 [ 717.245771][ T8943] usb 5-1: too many endpoints for config 1 interface 2 altsetting 2: 41, using maximum allowed: 30 [ 717.256921][ T8943] usb 5-1: config 1 interface 2 altsetting 2 has 0 endpoint descriptors, different from the interface descriptor's value: 41 [ 717.270314][ T8943] usb 5-1: config 1 interface 2 has no altsetting 0 [ 717.294661][T15802] EXT4-fs error (device loop5): ext4_fill_super:4709: inode #2: comm syz-executor.5: iget: root inode unallocated [ 717.308962][T15802] EXT4-fs (loop5): get root inode failed 02:18:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f00", 0x10, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:18:15 executing program 0: r0 = socket(0x29, 0x2, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=@newtclass={0x24}, 0x24}}, 0x0) [ 717.314681][T15802] EXT4-fs (loop5): mount failed [ 717.357450][ T695] usb 3-1: language id specifier not provided by device, defaulting to English [ 717.507378][ T695] usb 3-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 717.517042][ T695] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 717.525210][ T695] usb 3-1: Product: syz 02:18:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000", 0x16, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 717.529907][ T695] usb 3-1: Manufacturer: ૧蘦ޒ죈⋻ดᎮ됾⭣ࣘ㜨免׌孓Ι響秒ര⅀嶾뻺Ɤ࢓匄ꍢǎ敎ꑳ痧卫뜍镱䰿籧૊㾀쵵唱ᯬဒ̋強蘆߶恵苹ϔ憾㉒䚁早챙윔쨸س꽈昼㵂瀉ㅣ偣ϫﻆ姚쓧왯큔撚ꎾ糌鋐爺픮晭穠眡瑧ⓦ䐹乚凬ᐭ毛揭幢蘈㋧쳂꬟㌨⮣탦䢜 [ 717.561575][ T695] usb 3-1: SerialNumber: syz [ 717.618384][ T8943] usb 5-1: language id specifier not provided by device, defaulting to English [ 717.749486][ T8943] usb 5-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 717.759102][ T8943] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 717.767570][ T8943] usb 5-1: Product: syz [ 717.771961][ T8943] usb 5-1: Manufacturer: ૧蘦ޒ죈⋻ดᎮ됾⭣ࣘ㜨免׌孓Ι響秒ര⅀嶾뻺Ɤ࢓匄ꍢǎ敎ꑳ痧卫뜍镱䰿籧૊㾀쵵唱ᯬဒ̋強蘆߶恵苹ϔ憾㉒䚁早챙윔쨸س꽈昼㵂瀉ㅣ偣ϫﻆ姚쓧왯큔撚ꎾ糌鋐爺픮晭穠眡瑧ⓦ䐹乚凬ᐭ毛揭幢蘈㋧쳂꬟㌨⮣탦䢜 [ 717.801811][ T8943] usb 5-1: SerialNumber: syz [ 717.957653][ T695] hub 3-1:1.2: bad descriptor, ignoring hub [ 717.963776][ T695] hub: probe of 3-1:1.2 failed with error -5 [ 717.987918][T15815] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (61595!=0) [ 717.997682][T15815] EXT4-fs (loop3): group descriptors corrupted! [ 718.068224][ T695] usb 3-1: USB disconnect, device number 11 [ 718.187527][T15826] EXT4-fs error (device loop5): ext4_fill_super:4709: inode #2: comm syz-executor.5: iget: root inode unallocated [ 718.222630][T15826] EXT4-fs (loop5): get root inode failed [ 718.228536][T15826] EXT4-fs (loop5): mount failed [ 718.369179][ T8943] hub 5-1:1.2: bad descriptor, ignoring hub [ 718.375346][ T8943] hub: probe of 5-1:1.2 failed with error -5 [ 718.489837][ T8943] usb 5-1: USB disconnect, device number 11 [ 718.767203][ T695] usb 3-1: new full-speed USB device number 12 using dummy_hcd [ 719.066970][ T8943] usb 5-1: new full-speed USB device number 12 using dummy_hcd [ 719.090317][ T695] usb 3-1: not running at top speed; connect to a high speed hub [ 719.176799][ T695] usb 3-1: config 1 has an invalid descriptor of length 154, skipping remainder of the config [ 719.187501][ T695] usb 3-1: config 1 has 2 interfaces, different from the descriptor's value: 3 [ 719.196892][ T695] usb 3-1: config 1 has no interface number 1 [ 719.203187][ T695] usb 3-1: too many endpoints for config 1 interface 2 altsetting 0: 41, using maximum allowed: 30 [ 719.214263][ T695] usb 3-1: config 1 interface 2 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 41 [ 719.270400][ T695] usb 3-1: language id specifier not provided by device, defaulting to English [ 719.397654][ T695] usb 3-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 719.407070][ T695] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 719.415225][ T695] usb 3-1: Product: syz [ 719.420011][ T695] usb 3-1: Manufacturer: ૧蘦ޒ죈⋻ดᎮ됾⭣ࣘ㜨免׌孓Ι響秒ര⅀嶾뻺Ɤ࢓匄ꍢǎ敎ꑳ痧卫뜍镱䰿籧૊㾀쵵唱ᯬဒ̋強蘆߶恵苹ϔ憾㉒䚁早챙윔쨸س꽈昼㵂瀉ㅣ偣ϫﻆ姚쓧왯큔撚ꎾ糌鋐爺픮晭穠眡瑧ⓦ䐹乚凬ᐭ毛揭幢蘈㋧쳂꬟㌨⮣탦䢜 [ 719.452442][ T695] usb 3-1: SerialNumber: syz [ 719.496838][ T8943] usb 5-1: not running at top speed; connect to a high speed hub [ 719.576972][ T8943] usb 5-1: config 1 has an invalid descriptor of length 154, skipping remainder of the config [ 719.588898][ T8943] usb 5-1: config 1 has 2 interfaces, different from the descriptor's value: 3 [ 719.598437][ T8943] usb 5-1: config 1 has no interface number 1 [ 719.604757][ T8943] usb 5-1: too many endpoints for config 1 interface 2 altsetting 2: 41, using maximum allowed: 30 [ 719.615888][ T8943] usb 5-1: config 1 interface 2 altsetting 2 has 0 endpoint descriptors, different from the interface descriptor's value: 41 [ 719.629112][ T8943] usb 5-1: config 1 interface 2 has no altsetting 0 02:18:18 executing program 2: bpf$MAP_CREATE(0x11, 0x0, 0x0) 02:18:18 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000001500)={&(0x7f0000000080), 0x10, 0x0, 0x0, 0x0, 0xd0010100}, 0x0) [ 719.693221][ T695] usb 3-1: can't set config #1, error -71 [ 719.701684][ T8943] usb 5-1: language id specifier not provided by device, defaulting to English [ 719.715109][ T695] usb 3-1: USB disconnect, device number 12 02:18:18 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x19}, 0x40) 02:18:18 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000001500)={&(0x7f0000000080), 0x10, 0x0, 0x1e}, 0x0) 02:18:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f00", 0x10, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:18:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000", 0x16, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:18:18 executing program 1: bpf$MAP_CREATE(0x2, 0x0, 0x0) [ 719.946225][ T8943] usb 5-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 719.955471][ T8943] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 719.963866][ T8943] usb 5-1: Product: syz [ 719.968405][ T8943] usb 5-1: Manufacturer: ૧蘦ޒ죈⋻ดᎮ됾⭣ࣘ㜨免׌孓Ι響秒ര⅀嶾뻺Ɤ࢓匄ꍢǎ敎ꑳ痧卫뜍镱䰿籧૊㾀쵵唱ᯬဒ̋強蘆߶恵苹ϔ憾㉒䚁早챙윔쨸س꽈昼㵂瀉ㅣ偣ϫﻆ姚쓧왯큔撚ꎾ糌鋐爺픮晭穠眡瑧ⓦ䐹乚凬ᐭ毛揭幢蘈㋧쳂꬟㌨⮣탦䢜 [ 720.046741][ T8943] usb 5-1: can't set config #1, error -71 [ 720.056683][ T8943] usb 5-1: USB disconnect, device number 12 02:18:18 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) sendmmsg(r2, &(0x7f0000001e00), 0x3fffffffffffea6, 0x0) [ 720.226062][T15883] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (61595!=0) [ 720.235531][T15883] EXT4-fs (loop3): group descriptors corrupted! [ 720.292307][T15884] EXT4-fs error (device loop5): ext4_fill_super:4709: inode #2: comm syz-executor.5: iget: root inode unallocated [ 720.322756][T15884] EXT4-fs (loop5): get root inode failed [ 720.328865][T15884] EXT4-fs (loop5): mount failed 02:18:18 executing program 0: bpf$MAP_CREATE(0x13, &(0x7f0000000080), 0x40) 02:18:19 executing program 1: syz_usb_connect$uac1(0x2, 0x84, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x72, 0x3, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{}, [@mixer_unit={0x6, 0x24, 0x4, 0x2, 0x2, ')'}, @feature_unit={0xd, 0x24, 0x6, 0x0, 0x0, 0x3, [0x0, 0x0, 0x0]}]}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x10, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) 02:18:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000", 0x1a, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:18:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000", 0x18, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:18:19 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, "9efa620a9c14898b", "0a1a555d81566a270fe9bf3bb290a624ad90b07703c9caf6d56449a61b4b26d7", "7e3b8382", "e5d7c972fee205f7"}, 0x38) sendto$inet6(r0, 0x0, 0x0, 0x2, 0x0, 0x0) 02:18:19 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000300)={&(0x7f0000000000)=@name, 0x10, 0x0}, 0x0) [ 721.122821][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 721.154073][T15907] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 721.163708][T15907] EXT4-fs (loop3): group descriptors corrupted! [ 721.180966][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 721.274179][T15905] EXT4-fs error (device loop5): ext4_fill_super:4709: inode #2: comm syz-executor.5: iget: root inode unallocated 02:18:19 executing program 0: syz_usb_connect$uac1(0x2, 0x71, &(0x7f0000000040)={{0x12, 0x1, 0x200, 0x0, 0x0, 0x0, 0x40, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x1, [{0x0, 0x0}]}) [ 721.368515][T15905] EXT4-fs (loop5): get root inode failed [ 721.374360][T15905] EXT4-fs (loop5): mount failed [ 721.379913][T10833] usb 2-1: new full-speed USB device number 7 using dummy_hcd 02:18:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000", 0x18, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:18:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000", 0x1a, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:18:20 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, "9efa620a9c14898b", "0a1a555d81566a270fe9bf3bb290a624ad90b07703c9caf6d56449a61b4b26d7", "7e3b8382", "e5d7c972fee205f7"}, 0x38) sendto$inet6(r0, 0x0, 0x0, 0x2, 0x0, 0x0) 02:18:20 executing program 2: r0 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video0\x00', 0x2, 0x0) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f00000001c0)={0x0, 0xd, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "792bf0b5"}, 0x0, 0x0, @planes=0x0}) [ 721.759503][T10833] usb 2-1: config 1 has 2 interfaces, different from the descriptor's value: 3 [ 721.768771][T10833] usb 2-1: config 1 has no interface number 1 [ 721.775070][T10833] usb 2-1: too many endpoints for config 1 interface 2 altsetting 2: 41, using maximum allowed: 30 [ 721.786257][T10833] usb 2-1: config 1 interface 2 altsetting 2 endpoint 0x1 has an invalid bInterval 0, changing to 4 [ 721.797284][T10833] usb 2-1: config 1 interface 2 altsetting 2 endpoint 0x1 has invalid wMaxPacketSize 0 [ 721.807202][T10833] usb 2-1: config 1 interface 2 altsetting 2 has 1 endpoint descriptor, different from the interface descriptor's value: 41 [ 721.820345][T10833] usb 2-1: config 1 interface 2 altsetting 1 endpoint 0x82 has an invalid bInterval 0, changing to 4 [ 721.929622][T10054] usb 1-1: new full-speed USB device number 23 using dummy_hcd [ 721.943617][T15925] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 721.953330][T15925] EXT4-fs (loop3): group descriptors corrupted! [ 721.967631][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 722.057116][T10833] usb 2-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 722.066738][T10833] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 722.073680][T15930] EXT4-fs error (device loop5): ext4_fill_super:4709: inode #2: comm syz-executor.5: iget: root inode unallocated [ 722.074873][T10833] usb 2-1: Product: syz [ 722.075001][T10833] usb 2-1: Manufacturer: syz [ 722.075109][T10833] usb 2-1: SerialNumber: syz [ 722.127646][T15930] EXT4-fs (loop5): get root inode failed [ 722.133698][T15930] EXT4-fs (loop5): mount failed 02:18:20 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, "9efa620a9c14898b", "0a1a555d81566a270fe9bf3bb290a624ad90b07703c9caf6d56449a61b4b26d7", "7e3b8382", "e5d7c972fee205f7"}, 0x38) sendto$inet6(r0, 0x0, 0x0, 0x2, 0x0, 0x0) 02:18:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000", 0x18, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) [ 722.562882][T10833] usb 2-1: USB disconnect, device number 7 [ 722.610774][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 722.716364][T10054] usb 1-1: unable to read config index 0 descriptor/start: -71 [ 722.724117][T10054] usb 1-1: can't read configurations, error -71 [ 722.804886][T15959] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 722.814422][T15959] EXT4-fs (loop3): group descriptors corrupted! [ 723.316070][T10833] usb 2-1: new full-speed USB device number 8 using dummy_hcd [ 723.720959][T10833] usb 2-1: config 1 has 2 interfaces, different from the descriptor's value: 3 [ 723.730300][T10833] usb 2-1: config 1 has no interface number 1 [ 723.736912][T10833] usb 2-1: too many endpoints for config 1 interface 2 altsetting 2: 41, using maximum allowed: 30 [ 723.747888][T10833] usb 2-1: config 1 interface 2 altsetting 2 endpoint 0x1 has an invalid bInterval 0, changing to 4 [ 723.759013][T10833] usb 2-1: config 1 interface 2 altsetting 2 endpoint 0x1 has invalid wMaxPacketSize 0 [ 723.768963][T10833] usb 2-1: config 1 interface 2 altsetting 2 has 1 endpoint descriptor, different from the interface descriptor's value: 41 [ 723.784421][T10833] usb 2-1: config 1 interface 2 altsetting 1 endpoint 0x82 has an invalid bInterval 0, changing to 4 02:18:22 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1b, 0x1}, 0x40) 02:18:22 executing program 2: bpf$MAP_CREATE(0x21, 0x0, 0x0) 02:18:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000", 0x1a, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:18:22 executing program 0: bpf$MAP_CREATE(0x14, 0x0, 0x0) 02:18:22 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, "9efa620a9c14898b", "0a1a555d81566a270fe9bf3bb290a624ad90b07703c9caf6d56449a61b4b26d7", "7e3b8382", "e5d7c972fee205f7"}, 0x38) sendto$inet6(r0, 0x0, 0x0, 0x2, 0x0, 0x0) 02:18:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f00030004000000000000000000", 0x1c, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) [ 724.088912][T10833] usb 2-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 724.098298][T10833] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 724.106683][T10833] usb 2-1: Product: syz [ 724.111011][T10833] usb 2-1: Manufacturer: syz [ 724.239629][T10833] usb 2-1: can't set config #1, error -71 [ 724.294082][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 724.331345][T10833] usb 2-1: USB disconnect, device number 8 [ 724.350668][T15977] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 724.360311][T15977] EXT4-fs (loop3): group descriptors corrupted! 02:18:22 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) sendto$inet6(r0, 0x0, 0x0, 0x2, 0x0, 0x0) [ 724.511762][T15983] EXT4-fs error (device loop5): ext4_fill_super:4709: inode #2: comm syz-executor.5: iget: root inode unallocated 02:18:22 executing program 2: fsopen(&(0x7f0000000000)='cgroup2\x00', 0x0) [ 724.599422][T15983] EXT4-fs (loop5): get root inode failed [ 724.605380][T15983] EXT4-fs (loop5): mount failed 02:18:23 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {{}, {}, {0x14, 0x19, {0x9}}}}, 0x30}}, 0x0) 02:18:23 executing program 1: r0 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video0\x00', 0x2, 0x0) ioctl$VIDIOC_QBUF(r0, 0xc050565d, 0x0) 02:18:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f00030004000000000000000000", 0x1c, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:18:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400", 0x1c, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:18:23 executing program 2: r0 = fsopen(&(0x7f0000000000)='btrfs\x00', 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/autofs\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FD(r0, 0x5, &(0x7f0000000080)='*{(@!:*$\x00', 0x0, r1) [ 725.032136][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:18:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) sendto$inet6(r0, 0x0, 0x0, 0x2, 0x0, 0x0) [ 725.340833][T16005] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 725.350373][T16005] EXT4-fs (loop3): group descriptors corrupted! 02:18:23 executing program 1: mmap$usbfs(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x30, 0xffffffffffffffff, 0x0) 02:18:23 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x304}, "b41d00", "377a3f41518a0ecdc694f671b929f5ad", "122966e8", "5863a0c47ef307c0"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 725.496630][T16009] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 725.503354][T16009] EXT4-fs (loop5): mount failed 02:18:24 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x316) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r9, @ANYBLOB="ff000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000380)=@newlink={0x40, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x3}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r9}, @IFLA_IPTUN_REMOTE={0x8, 0x3, @local}]}}}]}, 0x40}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 02:18:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f00030004000000000000000000", 0x1c, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) [ 725.769399][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:18:24 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400", 0x1c, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:18:24 executing program 1: r0 = syz_open_dev$ndb(&(0x7f00000001c0)='/dev/nbd#\x00', 0x0, 0x2a00) ioctl$NBD_DISCONNECT(r0, 0xab08) 02:18:24 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) sendto$inet6(r0, 0x0, 0x0, 0x2, 0x0, 0x0) [ 726.055383][T16025] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 726.130456][T16025] 8021q: adding VLAN 0 to HW filter on device bond1 [ 726.340536][T16067] block nbd1: NBD_DISCONNECT [ 726.371269][T16064] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 726.381148][T16064] EXT4-fs (loop3): group descriptors corrupted! [ 726.553488][T16025] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 726.715065][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:18:25 executing program 2: bpf$MAP_CREATE(0x21, &(0x7f0000000080), 0x40) [ 726.906606][T16074] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 726.913281][T16074] EXT4-fs (loop5): mount failed 02:18:25 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000340)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)={0x14, r1, 0x32d}, 0x14}}, 0x0) 02:18:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f00", 0x1e, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:18:25 executing program 0: bpf$MAP_CREATE(0x7, 0x0, 0x0) 02:18:25 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, "9efa620a9c14898b", "0a1a555d81566a270fe9bf3bb290a624ad90b07703c9caf6d56449a61b4b26d7", "7e3b8382", "e5d7c972fee205f7"}, 0x38) sendto$inet6(r0, 0x0, 0x0, 0x2, 0x0, 0x0) 02:18:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400", 0x1c, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 727.525058][T16090] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (26926!=0) [ 727.534788][T16090] EXT4-fs (loop3): group descriptors corrupted! 02:18:26 executing program 2: bpf$MAP_CREATE(0xd, &(0x7f0000000080), 0x40) 02:18:26 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$VIDIOC_QBUF(r0, 0x541b, 0x0) [ 727.698076][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:18:26 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000100)={0x40}, 0x10) 02:18:26 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, "9efa620a9c14898b", "0a1a555d81566a270fe9bf3bb290a624ad90b07703c9caf6d56449a61b4b26d7", "7e3b8382", "e5d7c972fee205f7"}, 0x38) sendto$inet6(r0, 0x0, 0x0, 0x2, 0x0, 0x0) [ 728.012200][T16100] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 728.019021][T16100] EXT4-fs (loop5): mount failed 02:18:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f00", 0x1e, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:18:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:18:26 executing program 1: bpf$MAP_CREATE(0xa, &(0x7f0000000080), 0x40) [ 728.336633][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:18:26 executing program 2: r0 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video0\x00', 0x2, 0x0) ioctl$VIDIOC_QBUF(r0, 0x40186366, 0x0) 02:18:26 executing program 0: bpf$MAP_CREATE(0x18, 0x0, 0x0) [ 728.653896][T16116] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (26926!=0) [ 728.663641][T16116] EXT4-fs (loop3): group descriptors corrupted! 02:18:27 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, "9efa620a9c14898b", "0a1a555d81566a270fe9bf3bb290a624ad90b07703c9caf6d56449a61b4b26d7", "7e3b8382", "e5d7c972fee205f7"}, 0x38) sendto$inet6(r0, 0x0, 0x0, 0x2, 0x0, 0x0) [ 728.742585][T16119] EXT4-fs error (device loop5): ext4_fill_super:4709: inode #2: comm syz-executor.5: iget: root inode unallocated [ 728.761478][T16119] EXT4-fs (loop5): get root inode failed [ 728.767812][T16119] EXT4-fs (loop5): mount failed 02:18:27 executing program 1: socket(0x29, 0x2, 0x401) [ 729.052585][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:18:27 executing program 2: r0 = socket$inet6(0x18, 0x3, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 02:18:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f00", 0x1e, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:18:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:18:27 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x20, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x10, 0x0) 02:18:27 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, "9efa620a9c14898b", "0a1a555d81566a270fe9bf3bb290a624ad90b07703c9caf6d56449a61b4b26d7", "7e3b8382", "e5d7c972fee205f7"}, 0x38) sendto$inet6(r0, 0x0, 0x0, 0x2, 0x0, 0x0) 02:18:27 executing program 1: open$dir(&(0x7f0000000280)='./file0\x00', 0x201, 0x0) lchown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 729.792646][T16139] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (26926!=0) [ 729.802225][T16139] EXT4-fs (loop3): group descriptors corrupted! [ 729.867089][T16140] EXT4-fs error (device loop5): ext4_fill_super:4709: inode #2: comm syz-executor.5: iget: root inode unallocated 02:18:28 executing program 2: r0 = msgget(0xffffffffffffffff, 0x0) msgsnd(r0, &(0x7f0000000340)={0x2, "6ba1529d9040ff4e7b1a34425847c6c044572beac6010140d6ff39efbd805f92576eaebde09d94865a5d711493fa3c3ded050c11da2b4095f489ef1f00"/89}, 0x0, 0x800) msgrcv(r0, &(0x7f0000000080)={0x0, ""/41}, 0x31, 0x2, 0x1c00) 02:18:28 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, "9efa620a9c14898b", "0a1a555d81566a270fe9bf3bb290a624ad90b07703c9caf6d56449a61b4b26d7", "7e3b8382", "e5d7c972fee205f7"}, 0x38) sendto$inet6(r0, 0x0, 0x0, 0x2, 0x0, 0x0) [ 730.021625][T16140] EXT4-fs (loop5): get root inode failed [ 730.030146][T16140] EXT4-fs (loop5): mount failed 02:18:28 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r0, 0x0, &(0x7f00000000c0)) 02:18:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:18:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:18:28 executing program 1: r0 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video0\x00', 0x2, 0x0) ioctl$VIDIOC_QBUF(r0, 0x541b, 0x0) 02:18:29 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, "9efa620a9c14898b", "0a1a555d81566a270fe9bf3bb290a624ad90b07703c9caf6d56449a61b4b26d7", "7e3b8382", "e5d7c972fee205f7"}, 0x38) sendto$inet6(r0, 0x0, 0x0, 0x2, 0x0, 0x0) 02:18:29 executing program 2: select(0x40, &(0x7f0000000180)={0x3}, &(0x7f00000001c0)={0x3}, 0x0, 0x0) 02:18:29 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000000c0)=""/55, 0x37}], 0x1}, 0x0) [ 730.809237][T16161] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (26926!=46) [ 730.818939][T16161] EXT4-fs (loop3): group descriptors corrupted! [ 730.939364][T16164] EXT4-fs error (device loop5): ext4_fill_super:4709: inode #2: comm syz-executor.5: iget: root inode unallocated 02:18:29 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, "9efa620a9c14898b", "0a1a555d81566a270fe9bf3bb290a624ad90b07703c9caf6d56449a61b4b26d7", "7e3b8382", "e5d7c972fee205f7"}, 0x38) sendto$inet6(r0, 0x0, 0x0, 0x2, 0x0, 0x0) [ 731.103203][T16164] EXT4-fs (loop5): get root inode failed [ 731.109362][T16164] EXT4-fs (loop5): mount failed 02:18:29 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendto(r0, 0x0, 0x0, 0xe, 0x0, 0x0) recvmsg(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000000c0)=""/55, 0x37}], 0x1}, 0x0) 02:18:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:18:29 executing program 2: r0 = socket$inet6(0x18, 0x3, 0x0) setsockopt$sock_cred(r0, 0xffff, 0x1022, 0x0, 0x0) 02:18:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:18:29 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000080)="be4ce5516176bc50f77fddca6d590632af32b3dfb94cdb934555156e485a07bc1a3f78a88cf6ef8a5ea3297e2814eb338e2fc33a86d4011474bbab05109db7a18608dba3d1117e32bddcec9ce01c49011435ed0eb9ff742907cc679692967719576c2115f8300fa26645402c2d455e7669e98896d06a21ac67cae7e782018721b245cb3823be88ad888bcf3af26bd4b170", 0x91}], 0x1}, 0x0) 02:18:29 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, "9efa620a9c14898b", "0a1a555d81566a270fe9bf3bb290a624ad90b07703c9caf6d56449a61b4b26d7", "7e3b8382", "e5d7c972fee205f7"}, 0x38) sendto$inet6(r0, 0x0, 0x0, 0x2, 0x0, 0x0) [ 731.855413][T16189] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (26926!=46) [ 731.865089][T16189] EXT4-fs (loop3): group descriptors corrupted! [ 731.958083][T16193] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 731.968399][T16193] EXT4-fs (loop5): group descriptors corrupted! 02:18:30 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000000)=@abs={0x0, 0x0, 0x3}, 0x8) 02:18:30 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)=[{0x0}], 0x1, &(0x7f0000000180)=""/118, 0x76}, 0x0) 02:18:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:18:30 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000001240)='/dev/zero\x00', 0x0, 0x0) fcntl$lock(r0, 0x8, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x100000001, 0xffffffffffffffff}) 02:18:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:18:30 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, "9efa620a9c14898b", "0a1a555d81566a270fe9bf3bb290a624ad90b07703c9caf6d56449a61b4b26d7", "7e3b8382", "e5d7c972fee205f7"}, 0x38) sendto$inet6(r0, 0x0, 0x0, 0x2, 0x0, 0x0) 02:18:30 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) 02:18:31 executing program 1: select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x101}) [ 732.715328][T16209] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (26926!=46) [ 732.725049][T16209] EXT4-fs (loop3): group descriptors corrupted! [ 732.786365][T16211] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 732.799782][T16211] EXT4-fs (loop5): group descriptors corrupted! 02:18:31 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, "9efa620a9c14898b", "0a1a555d81566a270fe9bf3bb290a624ad90b07703c9caf6d56449a61b4b26d7", "7e3b8382", "e5d7c972fee205f7"}, 0x38) sendto$inet6(r0, 0x0, 0x0, 0x2, 0x0, 0x0) 02:18:31 executing program 0: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x101}) 02:18:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:18:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) [ 733.488550][T16218] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 733.498985][T16218] EXT4-fs (loop3): group descriptors corrupted! [ 733.718886][T16228] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 733.729100][T16228] EXT4-fs (loop5): group descriptors corrupted! 02:18:32 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, "9efa620a9c14898b", "0a1a555d81566a270fe9bf3bb290a624ad90b07703c9caf6d56449a61b4b26d7", "7e3b8382", "e5d7c972fee205f7"}, 0x38) sendto$inet6(r0, 0x0, 0x0, 0x2, 0x0, 0x0) 02:18:32 executing program 0: openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) 02:18:32 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) select(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x3}, 0x0, 0x0) 02:18:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:18:32 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280), 0x1000000000000152}, 0x0) 02:18:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {0x0, 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 734.384575][T16243] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 734.394721][T16243] EXT4-fs (loop3): group descriptors corrupted! 02:18:33 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000001680)='/dev/null\x00', 0x0, 0x0) fchown(r0, 0x0, 0x0) 02:18:33 executing program 0: select(0x0, 0x0, 0x0, &(0x7f0000000200), 0x0) 02:18:33 executing program 2: select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)) 02:18:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:18:33 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, "9efa620a9c14898b", "0a1a555d81566a270fe9bf3bb290a624ad90b07703c9caf6d56449a61b4b26d7", "7e3b8382", "e5d7c972fee205f7"}, 0x38) sendto$inet6(r0, 0x0, 0x0, 0x2, 0x0, 0x0) [ 734.776949][T16249] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 734.786978][T16249] EXT4-fs (loop5): group descriptors corrupted! [ 735.127173][T16260] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 735.137348][T16260] EXT4-fs (loop3): group descriptors corrupted! 02:18:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {0x0, 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:18:33 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_linger(r0, 0xffff, 0x80, &(0x7f0000000080)={0x0, 0x10001}, 0x8) 02:18:33 executing program 2: 02:18:33 executing program 0: 02:18:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:18:34 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, "9efa620a9c14898b", "0a1a555d81566a270fe9bf3bb290a624ad90b07703c9caf6d56449a61b4b26d7", "7e3b8382", "e5d7c972fee205f7"}, 0x38) sendto$inet6(r0, 0x0, 0x0, 0x2, 0x0, 0x0) [ 735.717434][T16271] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 735.727724][T16271] EXT4-fs (loop5): group descriptors corrupted! 02:18:34 executing program 1: 02:18:34 executing program 0: [ 735.977339][T16274] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 02:18:34 executing program 2: 02:18:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:18:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {0x0, 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:18:34 executing program 0: 02:18:34 executing program 1: 02:18:35 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, "9efa620a9c14898b", "0a1a555d81566a270fe9bf3bb290a624ad90b07703c9caf6d56449a61b4b26d7", "7e3b8382", "e5d7c972fee205f7"}, 0x38) sendto$inet6(r0, 0x0, 0x0, 0x2, 0x0, 0x0) [ 736.640318][T16287] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 02:18:35 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) [ 736.773098][T16290] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 736.784511][T16290] EXT4-fs (loop5): group descriptors corrupted! 02:18:35 executing program 2: 02:18:35 executing program 0: 02:18:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:18:35 executing program 1: 02:18:35 executing program 2: [ 737.455634][T16301] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 02:18:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, "9efa620a9c14898b", "0a1a555d81566a270fe9bf3bb290a624ad90b07703c9caf6d56449a61b4b26d7", "7e3b8382", "e5d7c972fee205f7"}, 0x38) sendto$inet6(r0, 0x0, 0x0, 0x2, 0x0, 0x0) [ 737.712098][T16307] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 737.722161][T16307] EXT4-fs (loop5): group descriptors corrupted! 02:18:36 executing program 0: 02:18:36 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {0x0, 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:18:36 executing program 2: 02:18:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:18:36 executing program 1: 02:18:36 executing program 0: 02:18:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, "9efa620a9c14898b", "0a1a555d81566a270fe9bf3bb290a624ad90b07703c9caf6d56449a61b4b26d7", "7e3b8382", "e5d7c972fee205f7"}, 0x38) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0, 0x0) [ 738.405589][T16319] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 738.471244][T16323] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 738.481550][T16323] EXT4-fs (loop5): group descriptors corrupted! 02:18:36 executing program 2: 02:18:37 executing program 1: 02:18:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {0x0, 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:18:37 executing program 0: 02:18:37 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, "9efa620a9c14898b", "0a1a555d81566a270fe9bf3bb290a624ad90b07703c9caf6d56449a61b4b26d7", "7e3b8382", "e5d7c972fee205f7"}, 0x38) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0, 0x0) 02:18:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:18:37 executing program 2: 02:18:37 executing program 1: [ 739.317181][T16337] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 739.327167][T16337] EXT4-fs (loop5): group descriptors corrupted! [ 739.435387][T16340] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 02:18:37 executing program 2: 02:18:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f00", 0x10, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:18:37 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, "9efa620a9c14898b", "0a1a555d81566a270fe9bf3bb290a624ad90b07703c9caf6d56449a61b4b26d7", "7e3b8382", "e5d7c972fee205f7"}, 0x38) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0, 0x0) 02:18:38 executing program 0: 02:18:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {0x0, 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:18:38 executing program 2: 02:18:38 executing program 1: [ 740.320183][T16351] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (61595!=0) [ 740.329721][T16351] EXT4-fs (loop5): group descriptors corrupted! 02:18:38 executing program 0: 02:18:38 executing program 1: 02:18:39 executing program 2: [ 740.631408][T16356] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 02:18:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, "9efa620a9c14898b", "0a1a555d81566a270fe9bf3bb290a624ad90b07703c9caf6d56449a61b4b26d7", "7e3b8382", "e5d7c972fee205f7"}, 0x38) sendto$inet6(r0, 0x0, 0x0, 0x2, 0x0, 0x0) 02:18:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f00", 0x10, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:18:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:18:39 executing program 1: 02:18:39 executing program 0: 02:18:39 executing program 2: [ 741.134921][T16369] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (61595!=0) [ 741.144482][T16369] EXT4-fs (loop5): group descriptors corrupted! 02:18:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, "9efa620a9c14898b", "0a1a555d81566a270fe9bf3bb290a624ad90b07703c9caf6d56449a61b4b26d7", "7e3b8382", "e5d7c972fee205f7"}, 0x38) sendto$inet6(r0, 0x0, 0x0, 0x2, 0x0, 0x0) 02:18:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f00", 0x10, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 741.679606][T16378] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 02:18:40 executing program 0: 02:18:40 executing program 1: [ 741.881659][T16385] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (61595!=0) [ 741.891215][T16385] EXT4-fs (loop5): group descriptors corrupted! 02:18:40 executing program 2: 02:18:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000", 0x18, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:18:40 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, "9efa620a9c14898b", "0a1a555d81566a270fe9bf3bb290a624ad90b07703c9caf6d56449a61b4b26d7", "7e3b8382", "e5d7c972fee205f7"}, 0x38) sendto$inet6(r0, 0x0, 0x0, 0x2, 0x0, 0x0) 02:18:40 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:18:40 executing program 0: 02:18:40 executing program 1: [ 742.541349][T16394] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 742.550875][T16394] EXT4-fs (loop5): group descriptors corrupted! 02:18:41 executing program 2: [ 742.689759][T16400] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 02:18:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000", 0x18, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:18:41 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, "9efa620a9c14898b", "0a1a555d81566a270fe9bf3bb290a624ad90b07703c9caf6d56449a61b4b26d7", "7e3b8382", "e5d7c972fee205f7"}, 0x38) sendto$inet6(r0, 0x0, 0x0, 0x2, 0x0, 0x0) 02:18:41 executing program 0: 02:18:41 executing program 1: 02:18:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:18:41 executing program 2: [ 743.318633][T16411] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 743.328257][T16411] EXT4-fs (loop5): group descriptors corrupted! 02:18:42 executing program 1: 02:18:42 executing program 0: 02:18:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, "9efa620a9c14898b", "0a1a555d81566a270fe9bf3bb290a624ad90b07703c9caf6d56449a61b4b26d7", "7e3b8382", "e5d7c972fee205f7"}, 0x38) sendto$inet6(r0, 0x0, 0x0, 0x2, 0x0, 0x0) 02:18:42 executing program 2: [ 743.857273][T16418] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 02:18:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, "9efa620a9c14898b", "0a1a555d81566a270fe9bf3bb290a624ad90b07703c9caf6d56449a61b4b26d7", "7e3b8382", "e5d7c972fee205f7"}, 0x38) sendto$inet6(r0, 0x0, 0x0, 0x2, 0x0, 0x0) 02:18:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000", 0x18, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:18:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:18:42 executing program 0: 02:18:42 executing program 1: [ 744.473769][T16430] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 744.483190][T16430] EXT4-fs (loop5): group descriptors corrupted! 02:18:43 executing program 2: 02:18:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f00030004000000000000000000", 0x1c, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:18:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040), 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, "9efa620a9c14898b", "0a1a555d81566a270fe9bf3bb290a624ad90b07703c9caf6d56449a61b4b26d7", "7e3b8382", "e5d7c972fee205f7"}, 0x38) sendto$inet6(r0, 0x0, 0x0, 0x2, 0x0, 0x0) [ 744.842968][T16437] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 02:18:43 executing program 0: 02:18:43 executing program 1: 02:18:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) [ 745.151121][T16443] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 745.160813][T16443] EXT4-fs (loop5): group descriptors corrupted! 02:18:43 executing program 2: 02:18:43 executing program 0: 02:18:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f00030004000000000000000000", 0x1c, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:18:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040), 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, "9efa620a9c14898b", "0a1a555d81566a270fe9bf3bb290a624ad90b07703c9caf6d56449a61b4b26d7", "7e3b8382", "e5d7c972fee205f7"}, 0x38) sendto$inet6(r0, 0x0, 0x0, 0x2, 0x0, 0x0) 02:18:44 executing program 1: [ 745.639287][T16452] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 02:18:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:18:44 executing program 2: [ 745.852492][T16458] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 745.861929][T16458] EXT4-fs (loop5): group descriptors corrupted! 02:18:44 executing program 2: 02:18:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f00030004000000000000000000", 0x1c, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:18:44 executing program 0: 02:18:44 executing program 1: [ 746.379020][T16468] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 02:18:44 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040), 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, "9efa620a9c14898b", "0a1a555d81566a270fe9bf3bb290a624ad90b07703c9caf6d56449a61b4b26d7", "7e3b8382", "e5d7c972fee205f7"}, 0x38) sendto$inet6(r0, 0x0, 0x0, 0x2, 0x0, 0x0) 02:18:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03000000", 0x4, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:18:44 executing program 2: [ 746.809019][T16477] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 746.820268][T16477] EXT4-fs (loop5): group descriptors corrupted! 02:18:45 executing program 0: 02:18:45 executing program 1: 02:18:45 executing program 2: 02:18:45 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, "9efa620a9c14898b", "0a1a555d81566a270fe9bf3bb290a624ad90b07703c9caf6d56449a61b4b26d7", "7e3b8382", "e5d7c972fee205f7"}, 0x38) sendto$inet6(r0, 0x0, 0x0, 0x2, 0x0, 0x0) 02:18:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f00", 0x1e, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 747.191048][T16483] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 02:18:45 executing program 0: 02:18:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03000000", 0x4, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) [ 747.479117][T16490] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (26926!=0) [ 747.488807][T16490] EXT4-fs (loop5): group descriptors corrupted! 02:18:46 executing program 1: 02:18:46 executing program 2: 02:18:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f00", 0x1e, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:18:46 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, "9efa620a9c14898b", "0a1a555d81566a270fe9bf3bb290a624ad90b07703c9caf6d56449a61b4b26d7", "7e3b8382", "e5d7c972fee205f7"}, 0x38) sendto$inet6(r0, 0x0, 0x0, 0x2, 0x0, 0x0) 02:18:46 executing program 0: [ 748.055080][T16501] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 02:18:46 executing program 1: [ 748.230941][T16507] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (26926!=0) [ 748.242307][T16507] EXT4-fs (loop5): group descriptors corrupted! 02:18:46 executing program 2: 02:18:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03000000", 0x4, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:18:46 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, "9efa620a9c14898b", "0a1a555d81566a270fe9bf3bb290a624ad90b07703c9caf6d56449a61b4b26d7", "7e3b8382", "e5d7c972fee205f7"}, 0x38) sendto$inet6(r0, 0x0, 0x0, 0x2, 0x0, 0x0) 02:18:46 executing program 0: 02:18:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f00", 0x1e, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:18:47 executing program 1: 02:18:47 executing program 2: poll(&(0x7f0000000080)=[{}], 0x1, 0x0) [ 749.029607][T16520] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 02:18:47 executing program 0: getsockname$unix(0xffffffffffffff9c, 0x0, 0x0) 02:18:47 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, "9efa620a9c14898b", "0a1a555d81566a270fe9bf3bb290a624ad90b07703c9caf6d56449a61b4b26d7", "7e3b8382", "e5d7c972fee205f7"}, 0x38) sendto$inet6(r0, 0x0, 0x0, 0x2, 0x0, 0x0) [ 749.211486][T16525] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (26926!=0) [ 749.221188][T16525] EXT4-fs (loop5): group descriptors corrupted! 02:18:47 executing program 1: shmctl$IPC_SET(0x0, 0x1, &(0x7f00000000c0)={{0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff}) 02:18:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:18:47 executing program 2: readv(0xffffffffffffff9c, 0x0, 0x0) 02:18:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:18:48 executing program 1: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) poll(&(0x7f0000000080)=[{}, {0xffffffffffffff9c}, {r0, 0x4}, {}, {}, {}, {}], 0x7, 0x0) [ 750.023201][T16541] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 02:18:48 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, "9efa620a9c14898b", "0a1a555d81566a270fe9bf3bb290a624ad90b07703c9caf6d56449a61b4b26d7", "7e3b8382", "e5d7c972fee205f7"}, 0x38) sendto$inet6(r0, 0x0, 0x0, 0x2, 0x0, 0x0) 02:18:48 executing program 0: recvmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 02:18:48 executing program 2: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getpeername(r0, 0x0, 0x0) [ 750.262093][T16546] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (26926!=46) [ 750.271863][T16546] EXT4-fs (loop5): group descriptors corrupted! 02:18:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:18:48 executing program 1: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) recvfrom$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 02:18:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:18:49 executing program 0: pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) poll(&(0x7f0000000140)=[{}, {}, {r0, 0x40}, {}], 0x4, 0x6) 02:18:49 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, "9efa620a9c14898b", "0a1a555d81566a270fe9bf3bb290a624ad90b07703c9caf6d56449a61b4b26d7", "7e3b8382", "e5d7c972fee205f7"}, 0x38) sendto$inet6(r0, 0x0, 0x0, 0x2, 0x0, 0x0) 02:18:49 executing program 2: semctl$GETALL(0x0, 0x0, 0x6, &(0x7f0000000000)=""/170) [ 751.048024][T16562] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 02:18:49 executing program 1: socketpair(0x6, 0x0, 0x10, 0x0) [ 751.142584][T16566] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (26926!=46) [ 751.152286][T16566] EXT4-fs (loop5): group descriptors corrupted! 02:18:49 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, "9efa620a9c14898b", "0a1a555d81566a270fe9bf3bb290a624ad90b07703c9caf6d56449a61b4b26d7", "7e3b8382", "e5d7c972fee205f7"}, 0x38) sendto$inet6(r0, 0x0, 0x0, 0x2, 0x0, 0x0) 02:18:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:18:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:18:50 executing program 2: poll(&(0x7f0000000080)=[{}], 0x1ffffffffffffe1a, 0x0) 02:18:50 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(r0, 0x400454dc, 0x0) 02:18:50 executing program 1: pselect6(0x40, &(0x7f0000000140), &(0x7f00000001c0)={0x1f}, 0x0, 0x0, 0x0) 02:18:50 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, "9efa620a9c14898b", "0a1a555d81566a270fe9bf3bb290a624ad90b07703c9caf6d56449a61b4b26d7", "7e3b8382", "e5d7c972fee205f7"}, 0x38) sendto$inet6(r0, 0x0, 0x0, 0x2, 0x0, 0x0) [ 752.013961][T16584] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (26926!=46) [ 752.023618][T16584] EXT4-fs (loop5): group descriptors corrupted! [ 752.056041][T16585] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 02:18:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:18:50 executing program 2: pipe2(&(0x7f0000000000), 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000017c0)={'syztnl0\x00', 0x0}) 02:18:50 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x0, 0x0) read$char_usb(r0, 0x0, 0x40) 02:18:50 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, "9efa620a9c14898b", "0a1a555d81566a270fe9bf3bb290a624ad90b07703c9caf6d56449a61b4b26d7", "7e3b8382", "e5d7c972fee205f7"}, 0x38) sendto$inet6(r0, 0x0, 0x0, 0x2, 0x0, 0x0) 02:18:50 executing program 1: clone(0x6300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') rt_sigaction(0x0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000300)) pwrite64(r0, 0x0, 0x0, 0x100000001) 02:18:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 753.004784][T16610] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 753.014880][T16610] EXT4-fs (loop5): group descriptors corrupted! 02:18:51 executing program 1: socket$unix(0x1, 0x0, 0x0) modify_ldt$write2(0x11, 0x0, 0x0) 02:18:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:18:51 executing program 0: syz_open_procfs(0x0, &(0x7f0000000200)='task\x00') 02:18:51 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, "9efa620a9c14898b", "0a1a555d81566a270fe9bf3bb290a624ad90b07703c9caf6d56449a61b4b26d7", "7e3b8382", "e5d7c972fee205f7"}, 0x38) sendto$inet6(r0, 0x0, 0x0, 0x2, 0x0, 0x0) 02:18:51 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x5, &(0x7f0000000080)) openat$urandom(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/urandom\x00', 0x543680, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000001600)={'ip6gre0\x00', &(0x7f0000001580)={'ip6tnl0\x00', 0x0, 0x4, 0x2e, 0x0, 0x52ceff9d, 0x20, @loopback, @private0, 0x7870, 0x700, 0x401}}) sendmmsg$sock(r0, &(0x7f0000006140)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000002f40)=@tipc=@id={0x1e, 0x3, 0x0, {0x4e22, 0x2}}, 0x80, &(0x7f0000005240)=[{0x0}, {&(0x7f0000003080)="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", 0x568}, {0x0}, {&(0x7f00000050c0)="2d06040d715e33b7b65a7464e6b0162919cbdec89d8bcafa44037d3de522c43947e482c1f51d0e49ae3451cb1532f4798cd569ca1e7e8a809bdedc18c560a160f6dd66f0afbce2", 0x47}], 0x4, &(0x7f00000052c0)=[@mark={{0x14, 0x1, 0x24, 0x401}}, @mark={{0x14}}, @mark={{0x14}}], 0x48}}, {{&(0x7f0000005380)=@l2tp={0x2, 0x0, @private=0xa010102, 0x2}, 0x80, &(0x7f0000005440)=[{&(0x7f0000005400)="e7d0e6b88567e55803b22686e69afc5dabf96808535b28ed5157723320b5a7d982f4a1ca48b9a072", 0x28}], 0x1, &(0x7f0000005480)=[@timestamping={{0x14, 0x1, 0x25, 0x8}}, @timestamping={{0x14, 0x1, 0x25, 0x64ed}}, @mark={{0x14, 0x1, 0x24, 0x9}}], 0x48}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000058c0)=[{&(0x7f0000005800)=',', 0x1}, {&(0x7f0000005840)="190f1d40139dc926f007d7e898b1c37b8aa3498cde25848b7453fbec229eba8809687cf864988c5c8fe6754a37d05de8d83cf1348a51611e9e0df04609440d1d4e3c22b5cae2d8ba1d3b1bad45e4b8a085895c63f07d3f621a75995fd40f4b8a6b70942f62e09a620f66d78eb2c4ca62eacd8a", 0x73}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x6, 0x800) [ 753.354146][T16617] EXT4-fs warning (device loop3): ext4_enable_quotas:6165: Failed to enable quota tracking (type=1, err=-22). Please run e2fsck to fix. 02:18:51 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000004e40)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, 0x0, 0x0) [ 753.483462][T16617] EXT4-fs (loop3): mount failed [ 753.772608][T16629] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 753.784203][T16629] EXT4-fs (loop5): group descriptors corrupted! 02:18:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {0x0, 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:18:52 executing program 0: clock_gettime(0x2, &(0x7f0000000100)) ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, 0x0) 02:18:52 executing program 1: clock_gettime(0x0, &(0x7f0000000000)) clone(0xbadb240d77aef59a, &(0x7f0000000280)="8f3b787f986fa7", &(0x7f0000000380), &(0x7f00000003c0), 0x0) 02:18:52 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/unix\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001180)) read$char_usb(r0, 0x0, 0x0) 02:18:52 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, "9efa620a9c14898b", "0a1a555d81566a270fe9bf3bb290a624ad90b07703c9caf6d56449a61b4b26d7", "7e3b8382", "e5d7c972fee205f7"}, 0x38) sendto$inet6(r0, 0x0, 0x0, 0x2, 0x0, 0x0) 02:18:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 754.382831][T16641] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 754.612358][T16651] IPVS: ftp: loaded support on port[0] = 21 [ 754.679520][T16652] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 754.689725][T16652] EXT4-fs (loop5): group descriptors corrupted! [ 754.942391][ T914] tipc: TX() has been purged, node left! 02:18:53 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000001100)=@gcm_256={{}, "fba18303aec40e2c", "4b16c68c74b3f324240f35ad2f426e4e1a5ccd098fbd3bfaf61def2a9ac4b0a5", "89729365", "f6f1751cdf6e7234"}, 0x38) 02:18:53 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, "9efa620a9c14898b", "0a1a555d81566a270fe9bf3bb290a624ad90b07703c9caf6d56449a61b4b26d7", "7e3b8382", "e5d7c972fee205f7"}, 0x38) sendto$inet6(r0, 0x0, 0x0, 0x2, 0x0, 0x0) 02:18:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {0x0, 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:18:53 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/unix\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001180)) read$char_usb(r0, 0x0, 0x0) 02:18:53 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') read$char_usb(r0, 0x0, 0x0) 02:18:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 755.986288][T16688] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 756.045503][T16691] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 02:18:54 executing program 1: ioctl$TIOCL_BLANKSCREEN(0xffffffffffffffff, 0x541c, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') 02:18:54 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x2, 0x0) write$P9_RSTAT(r0, 0x0, 0x0) 02:18:54 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, "9efa620a9c14898b", "0a1a555d81566a270fe9bf3bb290a624ad90b07703c9caf6d56449a61b4b26d7", "7e3b8382", "e5d7c972fee205f7"}, 0x38) sendto$inet6(r0, 0x0, 0x0, 0x2, 0x0, 0x0) 02:18:54 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000003740)='smaps\x00') io_setup(0x0, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f0000000140)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0xffff}]) read$char_usb(r0, 0x0, 0x0) 02:18:54 executing program 2: getresuid(&(0x7f0000004ec0), &(0x7f0000004f00), &(0x7f0000004f40)) 02:18:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:18:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {0x0, 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:18:55 executing program 1: 02:18:55 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000140)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @private2}}) 02:18:55 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, "9efa620a9c14898b", "0a1a555d81566a270fe9bf3bb290a624ad90b07703c9caf6d56449a61b4b26d7", "7e3b8382", "e5d7c972fee205f7"}, 0x38) sendto$inet6(r0, 0x0, 0x0, 0x2, 0x0, 0x0) 02:18:55 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/locks\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) [ 757.160286][T16714] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 757.260632][T16718] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 02:18:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:18:56 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000000)={{0x1b, 0x5b, 0x50, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 02:18:56 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000001c0)={'ip6tnl0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private0={0xfc, 0x0, [], 0x1}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) 02:18:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:18:56 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 02:18:56 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, "9efa620a9c14898b", "0a1a555d81566a270fe9bf3bb290a624ad90b07703c9caf6d56449a61b4b26d7", "7e3b8382", "e5d7c972fee205f7"}, 0x38) sendto$inet6(r0, 0x0, 0x0, 0x2, 0x0, 0x0) [ 757.918245][T16729] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 758.168293][T16736] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 02:18:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {0x0, 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:18:57 executing program 0: 02:18:57 executing program 1: 02:18:57 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, "9efa620a9c14898b", "0a1a555d81566a270fe9bf3bb290a624ad90b07703c9caf6d56449a61b4b26d7", "7e3b8382", "e5d7c972fee205f7"}, 0x38) sendto$inet6(r0, 0x0, 0x0, 0x2, 0x0, 0x0) 02:18:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:18:57 executing program 2: [ 759.101627][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 759.154803][T16752] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 02:18:57 executing program 1: 02:18:57 executing program 0: 02:18:57 executing program 2: 02:18:57 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, "9efa620a9c14898b", "0a1a555d81566a270fe9bf3bb290a624ad90b07703c9caf6d56449a61b4b26d7", "7e3b8382", "e5d7c972fee205f7"}, 0x38) sendto$inet6(r0, 0x0, 0x0, 0x2, 0x0, 0x0) [ 759.407582][T16760] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 02:18:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:18:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {0x0, 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 759.788552][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 759.991844][T16773] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 760.040903][T16777] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 02:18:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {0x0, 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:18:58 executing program 2: 02:18:58 executing program 1: 02:18:58 executing program 0: 02:18:58 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, "9efa620a9c14898b", "0a1a555d81566a270fe9bf3bb290a624ad90b07703c9caf6d56449a61b4b26d7", "7e3b8382", "e5d7c972fee205f7"}, 0x38) sendto$inet6(r0, 0x0, 0x0, 0x2, 0x0, 0x0) 02:18:58 executing program 0: 02:18:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) [ 760.625676][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:18:59 executing program 1: 02:18:59 executing program 2: [ 760.782176][T16789] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 760.862239][T16794] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 02:18:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:18:59 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, "9efa620a9c14898b", "0a1a555d81566a270fe9bf3bb290a624ad90b07703c9caf6d56449a61b4b26d7", "7e3b8382", "e5d7c972fee205f7"}, 0x38) sendto$inet6(r0, 0x0, 0x0, 0x2, 0x0, 0x0) 02:18:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:18:59 executing program 0: 02:18:59 executing program 1: [ 761.319606][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:18:59 executing program 2: [ 761.444759][T16803] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 02:19:00 executing program 1: 02:19:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) [ 761.693810][T16813] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 02:19:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:19:00 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, "9efa620a9c14898b", "0a1a555d81566a270fe9bf3bb290a624ad90b07703c9caf6d56449a61b4b26d7", "7e3b8382", "e5d7c972fee205f7"}, 0x38) sendto$inet6(r0, 0x0, 0x0, 0x2, 0x0, 0x0) 02:19:00 executing program 2: 02:19:00 executing program 0: [ 762.265121][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:19:00 executing program 1: 02:19:00 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, "9efa620a9c14898b", "0a1a555d81566a270fe9bf3bb290a624ad90b07703c9caf6d56449a61b4b26d7", "7e3b8382", "e5d7c972fee205f7"}, 0x38) sendto$inet6(r0, 0x0, 0x0, 0x2, 0x0, 0x0) [ 762.504208][T16825] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 02:19:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:19:01 executing program 2: [ 762.636024][T16826] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 02:19:01 executing program 0: [ 762.849722][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:19:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03000000", 0x4, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:19:01 executing program 1: 02:19:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, "9efa620a9c14898b", "0a1a555d81566a270fe9bf3bb290a624ad90b07703c9caf6d56449a61b4b26d7", "7e3b8382", "e5d7c972fee205f7"}, 0x38) sendto$inet6(r0, 0x0, 0x0, 0x2, 0x0, 0x0) 02:19:01 executing program 2: 02:19:01 executing program 0: [ 763.232511][T16840] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 02:19:01 executing program 1: 02:19:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 763.696827][T16848] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 763.706689][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:19:02 executing program 2: 02:19:02 executing program 0: 02:19:02 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, "9efa620a9c14898b", "0a1a555d81566a270fe9bf3bb290a624ad90b07703c9caf6d56449a61b4b26d7", "7e3b8382", "e5d7c972fee205f7"}, 0x38) sendto$inet6(r0, 0x0, 0x0, 0x2, 0x0, 0x0) 02:19:02 executing program 1: 02:19:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03000000", 0x4, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) [ 764.253786][T16860] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 02:19:02 executing program 0: 02:19:02 executing program 2: [ 764.500534][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:19:03 executing program 1: request_key(&(0x7f0000000740)='pkcs7_test\x00', 0x0, 0x0, 0x0) 02:19:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 764.751881][T16869] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 02:19:03 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, "9efa620a9c14898b", "0a1a555d81566a270fe9bf3bb290a624ad90b07703c9caf6d56449a61b4b26d7", "7e3b8382", "e5d7c972fee205f7"}, 0x38) sendto$inet6(r0, 0x0, 0x0, 0x2, 0x0, 0x0) 02:19:03 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGEFFECTS(r0, 0x80044584, &(0x7f0000000100)=""/127) 02:19:03 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKSECDISCARD(r0, 0x127d, 0x0) 02:19:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03000000", 0x4, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) [ 765.292683][T16880] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 02:19:03 executing program 1: shmat(0x0, &(0x7f0000fff000/0x1000)=nil, 0x6800) r0 = shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x5000) shmdt(r0) [ 765.444553][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:19:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:19:04 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x4021) 02:19:04 executing program 0: migrate_pages(0xffffffffffffffff, 0x7, 0x0, &(0x7f0000000200)=0x80000001) setpriority(0x2, 0xffffffffffffffff, 0x0) timerfd_settime(0xffffffffffffffff, 0x1, &(0x7f00000001c0)={{0x0, 0x3938700}, {0x0, 0x3938700}}, &(0x7f0000000240)) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0xff, 0x400000) ioctl$BLKGETSIZE64(r0, 0x80081272, &(0x7f0000000180)) r1 = syz_open_dev$loop(&(0x7f0000003280)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 02:19:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x2, 0x0, 0x0) [ 765.935611][T16894] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 02:19:04 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 02:19:04 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0xe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 766.262568][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:19:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x2, 0x0, 0x0) 02:19:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:19:04 executing program 2: syz_open_procfs(0x0, &(0x7f0000000000)='net/ipv6_route\x00') [ 766.394903][T16907] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 02:19:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03000000", 0x4, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 766.764778][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:19:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x2, 0x0, 0x0) [ 766.847507][T16917] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 02:19:05 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1510c0, 0x0) 02:19:05 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f00000001c0)=""/156) 02:19:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:19:05 executing program 2: openat$cachefiles(0xffffffffffffff9c, 0x0, 0x4188a6eac9dda9e5, 0x0) [ 767.285924][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:19:05 executing program 0: clock_gettime(0x5, &(0x7f0000000540)) [ 767.428259][T16931] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 02:19:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03000000", 0x4, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:19:06 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000140)=@get={0x1, &(0x7f0000000080)=""/146, 0x3ff}) 02:19:06 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{}, "9efa620a9c14898b", "0a1a555d81566a270fe9bf3bb290a624ad90b07703c9caf6d56449a61b4b26d7", "7e3b8382", "e5d7c972fee205f7"}, 0x38) sendto$inet6(r0, 0x0, 0x0, 0x2, 0x0, 0x0) [ 767.808826][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 767.809304][T16942] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 02:19:06 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$sock(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) bind(r0, &(0x7f00000001c0)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80) 02:19:06 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{}, "9efa620a9c14898b", "0a1a555d81566a270fe9bf3bb290a624ad90b07703c9caf6d56449a61b4b26d7", "7e3b8382", "e5d7c972fee205f7"}, 0x38) sendto$inet6(r0, 0x0, 0x0, 0x2, 0x0, 0x0) 02:19:06 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0xa, 0x0, &(0x7f0000000040)) 02:19:06 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='io\x00') read$FUSE(r0, 0x0, 0x0) [ 768.228864][T16952] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 02:19:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) [ 768.356208][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:19:06 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{}, "9efa620a9c14898b", "0a1a555d81566a270fe9bf3bb290a624ad90b07703c9caf6d56449a61b4b26d7", "7e3b8382", "e5d7c972fee205f7"}, 0x38) sendto$inet6(r0, 0x0, 0x0, 0x2, 0x0, 0x0) 02:19:06 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 02:19:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03000000", 0x4, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:19:07 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) [ 768.925362][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:19:07 executing program 1: r0 = shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x7800) shmdt(r0) shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x4000) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x5000) [ 769.003338][T16972] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 02:19:07 executing program 2: r0 = creat(&(0x7f0000000200)='./file0\x00', 0x0) fstat(r0, &(0x7f0000001400)) write$apparmor_current(r0, &(0x7f0000000040)=ANY=[], 0xfdfd) 02:19:07 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, "9efa620a9c14898b", "0a1a555d81566a270fe9bf3bb290a624ad90b07703c9caf6d56449a61b4b26d7", "7e3b8382", "e5d7c972fee205f7"}, 0x38) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0, 0x0) 02:19:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) [ 769.512507][T16978] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 02:19:08 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=ANY=[], 0x64}}, 0x0) [ 769.768286][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:19:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:19:08 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cmdline\x00') read$FUSE(r0, &(0x7f00000020c0)={0x2020}, 0x2020) 02:19:08 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000002140)='net/ip_vs_stats_percpu\x00') read$FUSE(r0, 0x0, 0x0) 02:19:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:19:08 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, "9efa620a9c14898b", "0a1a555d81566a270fe9bf3bb290a624ad90b07703c9caf6d56449a61b4b26d7", "7e3b8382", "e5d7c972fee205f7"}, 0x38) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0, 0x0) 02:19:08 executing program 0: syz_emit_ethernet(0x26, &(0x7f0000000040)={@local, @dev, @val={@void}, {@ipv4={0x800, @generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}}, 0x0) [ 770.360614][T17000] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 02:19:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:19:08 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/user\x00') setns(r0, 0x8000000) [ 770.601878][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:19:09 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000001b00)='fd/3\x00') [ 770.732322][T17013] EXT4-fs (loop3): unsupported descriptor size 0 02:19:09 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x4, 0x420, 0xffffffff, 0x0, 0x0, 0x1c0, 0xffffffff, 0xffffffff, 0x350, 0x350, 0x350, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0xa8, 0xf0}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_vlan\x00'}}}, {{@uncond, 0x0, 0x168, 0x190, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, @remote}}]}, @REJECT={0x28, 'REJECT\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x480) 02:19:09 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, "9efa620a9c14898b", "0a1a555d81566a270fe9bf3bb290a624ad90b07703c9caf6d56449a61b4b26d7", "7e3b8382", "e5d7c972fee205f7"}, 0x38) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0, 0x0) 02:19:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) [ 771.082356][T17020] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 771.136025][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:19:09 executing program 2: renameat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 02:19:09 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$fscrypt_provisioning(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 771.452396][T17031] EXT4-fs (loop3): unsupported descriptor size 0 02:19:09 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, "9efa620a9c14898b", "0a1a555d81566a270fe9bf3bb290a624ad90b07703c9caf6d56449a61b4b26d7", "7e3b8382", "e5d7c972fee205f7"}, 0x38) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 02:19:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:19:10 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x0, 0x0, &(0x7f0000000000)=0xfffffffffffffe06) 02:19:10 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$unix(r0, 0x0, &(0x7f0000000280)) 02:19:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) [ 771.909766][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:19:10 executing program 2: shmat(0x0, &(0x7f0000ffa000/0x3000)=nil, 0x4000) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) 02:19:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, "9efa620a9c14898b", "0a1a555d81566a270fe9bf3bb290a624ad90b07703c9caf6d56449a61b4b26d7", "7e3b8382", "e5d7c972fee205f7"}, 0x38) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 02:19:10 executing program 1: perf_event_open(&(0x7f0000000040)={0x6, 0x70, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 772.283296][T17047] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 772.339952][T17050] EXT4-fs (loop3): unsupported descriptor size 0 02:19:10 executing program 2: pipe(&(0x7f0000007640)={0xffffffffffffffff}) pipe(&(0x7f0000007640)={0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000100)={0x20000000}) 02:19:10 executing program 0: syz_open_procfs(0x0, &(0x7f0000000100)='net/snmp6\x00') 02:19:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:19:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) [ 772.701162][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:19:11 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 02:19:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, "9efa620a9c14898b", "0a1a555d81566a270fe9bf3bb290a624ad90b07703c9caf6d56449a61b4b26d7", "7e3b8382", "e5d7c972fee205f7"}, 0x38) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 02:19:11 executing program 0: syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_flowlabel\x00') 02:19:11 executing program 2: msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000000)=""/178) [ 773.157073][T17068] EXT4-fs (loop5): unsupported descriptor size 0 02:19:11 executing program 1: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000f80)='/dev/cachefiles\x00', 0x105200, 0x0) [ 773.347424][T17072] EXT4-fs (loop3): unsupported descriptor size 0 02:19:11 executing program 0: syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') io_setup(0x5, &(0x7f0000001000)=0x0) io_destroy(r0) 02:19:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:19:12 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x1}, 0x7e) 02:19:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:19:12 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f0000000000)={0x0, 0x0, 0x0, {}, {}, @ramp}) 02:19:12 executing program 1: r0 = open(&(0x7f0000000240)='./file0\x00', 0x40140, 0x0) read$FUSE(r0, 0x0, 0x0) [ 773.999647][T17091] EXT4-fs (loop5): unsupported descriptor size 0 [ 774.308564][T17098] EXT4-fs (loop3): unsupported descriptor size 0 02:19:12 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x4}, 0x14}}, 0x0) 02:19:12 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00') 02:19:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:19:13 executing program 2: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x2, 0x0) 02:19:13 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:19:13 executing program 1: syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00') r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000240)) 02:19:13 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000042c0)='gid_map\x00') write$FUSE_DIRENT(r0, 0x0, 0x0) 02:19:13 executing program 4: socketpair(0x0, 0x0, 0x0, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000f80)='/dev/cachefiles\x00', 0x0, 0x0) io_setup(0x5, &(0x7f0000001000)) [ 774.944259][T17114] EXT4-fs (loop5): unsupported descriptor size 0 02:19:13 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKZEROOUT(r0, 0x127f, 0x0) [ 775.161026][T17118] EXT4-fs (loop3): unsupported descriptor size 0 02:19:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:19:13 executing program 4: io_cancel(0x0, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000013c0)='team\x00') 02:19:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:19:14 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') openat$cgroup_int(r0, &(0x7f00000000c0)='cpuset.mems\x00', 0x2, 0x0) 02:19:14 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) connect(r0, &(0x7f0000000240)=@un=@file={0x0, './file0\x00'}, 0x80) 02:19:14 executing program 2: socketpair(0x10, 0x2, 0x800, 0x0) [ 775.923931][T17133] EXT4-fs (loop5): unsupported descriptor size 0 [ 776.173978][T17139] EXT4-fs (loop3): unsupported descriptor size 0 02:19:14 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@ipv4_newroute={0x24, 0x18, 0x1, 0x0, 0x0, {}, [@RTA_FLOW={0x8}]}, 0x24}}, 0x0) 02:19:14 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000600)='/dev/uinput\x00', 0x0, 0x0) 02:19:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:19:14 executing program 1: ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f00000000c0)={'sit0\x00', 0x0}) msgctl$IPC_STAT(0x0, 0x2, &(0x7f00000001c0)=""/4096) 02:19:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:19:15 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect(r0, 0x0, 0x0) 02:19:15 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r1 = socket(0x400000000000010, 0x802, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_int(r0, 0x0, 0x13, 0x0, 0x0) [ 776.864969][T17157] EXT4-fs (loop5): unsupported descriptor size 0 02:19:15 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind(r0, &(0x7f00000001c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr=0x64010100}}, 0x80) 02:19:15 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x2, 0xa, 0x0, 0xa, 0x2}, 0x10}}, 0x0) [ 777.064226][T17163] EXT4-fs (loop3): unsupported descriptor size 0 02:19:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:19:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724", 0x10, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:19:15 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x4}, 0x14}}, 0x0) 02:19:15 executing program 1: r0 = inotify_init() inotify_add_watch(r0, 0x0, 0x1) 02:19:15 executing program 0: shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0xf000) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x7800) 02:19:16 executing program 2: open(&(0x7f0000000240)='./file0\x00', 0x40, 0x0) utimes(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={{}, {0x77359400}}) [ 777.651430][T17177] EXT4-fs (loop5): unsupported descriptor size 0 02:19:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 778.300402][T17191] EXT4-fs (loop5): unsupported descriptor size 0 02:19:16 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) [ 778.377783][T17195] EXT4-fs (loop3): unsupported descriptor size 0 02:19:16 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="5500000018007f1dfd0000b2a4a280930a80000000284308910000000e00080008", 0x21}], 0x1}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = socket$netlink(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 02:19:16 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000000)=0x18, 0x4) 02:19:17 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x0) 02:19:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:19:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724", 0x10, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) [ 778.943695][T17207] netlink: 41 bytes leftover after parsing attributes in process `syz-executor.4'. 02:19:17 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0xff45) 02:19:17 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000042c0)='gid_map\x00') read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0x2020) write$FUSE_ATTR(r0, 0x0, 0x0) [ 779.174276][T17210] EXT4-fs (loop5): unsupported descriptor size 0 02:19:17 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/dev_snmp6\x00') mknodat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) 02:19:17 executing program 2: perf_event_open(&(0x7f00000000c0)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 779.357230][T17213] EXT4-fs (loop3): unsupported descriptor size 0 02:19:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:19:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724", 0x10, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:19:18 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) recvmmsg(r0, &(0x7f0000001b80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000120, 0x0) 02:19:18 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x328, 0xffffffff, 0x0, 0x198, 0x198, 0xffffffff, 0xffffffff, 0x290, 0x290, 0x290, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa0, 0x100, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @random="550b2a9424ac"}}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@local, @broadcast, 0x0, 0x0, 'bridge_slave_0\x00', 'batadv_slave_1\x00'}, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@inet=@length={{0x28, 'length\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@inet=@SET3={0x38, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x388) 02:19:18 executing program 1: syz_genetlink_get_family_id$wireguard(&(0x7f0000000440)='wireguard\x00') sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, 0x0, 0x0) io_setup(0x5, &(0x7f0000001000)) 02:19:18 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000002940)='/dev/net/tun\x00', 0x0, 0x0) [ 779.980982][T17228] EXT4-fs (loop5): unsupported descriptor size 0 [ 780.133344][T17231] EXT4-fs (loop3): unsupported descriptor size 0 02:19:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724", 0x10, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:19:18 executing program 0: 02:19:18 executing program 4: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffc, "290f62bfd8fdd94bf3ba05741e86a6f1620768a6157665d307bf36c6d41a8b77"}) 02:19:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5", 0x18, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:19:19 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 780.650326][T17247] EXT4-fs (loop5): unsupported descriptor size 0 02:19:19 executing program 1: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000040)=@hat={'changehat '}, 0x1d) 02:19:19 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) connect(r0, &(0x7f0000000140)=@hci, 0x80) 02:19:19 executing program 0: perf_event_open(0x0, 0x0, 0x100000000000000, 0xffffffffffffffff, 0x0) clock_gettime(0x1, &(0x7f00000000c0)) [ 781.036672][T17254] EXT4-fs (loop3): unsupported descriptor size 0 02:19:19 executing program 4: 02:19:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724", 0x10, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:19:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5", 0x18, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:19:19 executing program 0: 02:19:19 executing program 2: [ 781.368968][T17263] AppArmor: change_hat: Invalid input, NULL hat and NULL magic [ 781.638418][T17267] EXT4-fs (loop5): unsupported descriptor size 0 02:19:20 executing program 1: 02:19:20 executing program 4: 02:19:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724", 0x10, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 781.960951][T17274] EXT4-fs (loop3): unsupported descriptor size 0 02:19:20 executing program 0: 02:19:20 executing program 2: 02:19:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5", 0x18, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) [ 782.374950][T17281] EXT4-fs (loop5): unsupported descriptor size 0 02:19:20 executing program 1: 02:19:21 executing program 4: 02:19:21 executing program 2: 02:19:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5", 0x18, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:19:21 executing program 0: 02:19:21 executing program 1: [ 782.971875][T17289] EXT4-fs (loop3): unsupported descriptor size 0 02:19:21 executing program 4: 02:19:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378", 0x1c, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:19:21 executing program 2: [ 783.388042][T17298] EXT4-fs (loop5): unsupported descriptor size 0 02:19:21 executing program 0: 02:19:21 executing program 1: 02:19:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5", 0x18, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 783.719614][T17303] EXT4-fs (loop3): unsupported descriptor size 0 02:19:22 executing program 0: 02:19:22 executing program 4: 02:19:22 executing program 1: 02:19:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378", 0x1c, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:19:22 executing program 2: [ 784.156219][T17312] EXT4-fs (loop5): unsupported descriptor size 0 02:19:22 executing program 0: 02:19:22 executing program 4: [ 784.492139][T17319] EXT4-fs (loop3): unsupported descriptor size 0 02:19:22 executing program 4: 02:19:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5", 0x18, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:19:23 executing program 1: 02:19:23 executing program 2: 02:19:23 executing program 0: 02:19:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378", 0x1c, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) [ 784.984832][T17326] EXT4-fs (loop5): unsupported descriptor size 0 02:19:23 executing program 4: 02:19:23 executing program 1: [ 785.380039][T17334] EXT4-fs (loop3): unsupported descriptor size 0 02:19:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378", 0x1c, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:19:23 executing program 4: 02:19:23 executing program 0: 02:19:23 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001140)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) 02:19:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5277033780100", 0x1e, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:19:24 executing program 1: [ 786.071665][T17345] EXT4-fs (loop5): unsupported descriptor size 0 02:19:24 executing program 4: 02:19:24 executing program 1: 02:19:24 executing program 2: 02:19:24 executing program 0: 02:19:24 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378", 0x1c, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 786.440032][T17351] EXT4-fs (loop3): unsupported descriptor size 0 02:19:24 executing program 4: 02:19:25 executing program 1: 02:19:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5277033780100", 0x1e, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:19:25 executing program 0: 02:19:25 executing program 2: 02:19:25 executing program 1: [ 787.160192][T17360] EXT4-fs (loop5): unsupported descriptor size 0 02:19:25 executing program 4: [ 787.401799][T17365] EXT4-fs (loop3): unsupported descriptor size 0 02:19:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378", 0x1c, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:19:26 executing program 1: 02:19:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5277033780100", 0x1e, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:19:26 executing program 0: [ 787.912926][T17373] EXT4-fs (loop5): unsupported descriptor size 0 02:19:26 executing program 2: 02:19:26 executing program 0: 02:19:26 executing program 4: 02:19:26 executing program 4: 02:19:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5277033780100", 0x1e, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 788.575943][T17380] EXT4-fs (loop3): unsupported descriptor size 0 02:19:27 executing program 0: 02:19:27 executing program 1: 02:19:27 executing program 2: 02:19:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:19:27 executing program 0: [ 789.084377][T17390] EXT4-fs (loop5): unsupported descriptor size 0 02:19:27 executing program 4: 02:19:27 executing program 1: 02:19:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5277033780100", 0x1e, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:19:27 executing program 2: 02:19:27 executing program 4: [ 789.575643][T17398] EXT4-fs (loop3): unsupported descriptor size 0 02:19:28 executing program 0: 02:19:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) [ 790.036251][T17406] EXT4-fs (loop5): unsupported descriptor size 0 02:19:28 executing program 2: 02:19:28 executing program 4: 02:19:28 executing program 1: 02:19:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5277033780100", 0x1e, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:19:28 executing program 0: [ 790.533438][T17413] EXT4-fs (loop3): unsupported descriptor size 0 02:19:29 executing program 2: 02:19:29 executing program 4: 02:19:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:19:29 executing program 1: [ 790.981604][T17421] EXT4-fs (loop5): unsupported descriptor size 0 02:19:29 executing program 0: 02:19:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 791.320600][T17428] EXT4-fs (loop3): unsupported descriptor size 0 02:19:29 executing program 4: 02:19:29 executing program 2: 02:19:29 executing program 1: 02:19:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) [ 791.723209][T17434] EXT4-fs (loop5): unsupported descriptor size 0 02:19:30 executing program 0: 02:19:30 executing program 4: 02:19:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:19:30 executing program 2: 02:19:30 executing program 1: [ 792.273617][T17442] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 02:19:31 executing program 4: 02:19:31 executing program 0: [ 792.669929][T17449] EXT4-fs (loop5): unsupported descriptor size 0 02:19:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) [ 792.979424][T17455] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 02:19:31 executing program 0: 02:19:31 executing program 2: 02:19:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:19:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:19:31 executing program 1: 02:19:31 executing program 4: 02:19:31 executing program 0: [ 793.692087][T17466] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 793.739507][T17468] EXT4-fs (loop5): unsupported descriptor size 0 02:19:32 executing program 2: 02:19:32 executing program 1: 02:19:32 executing program 4: 02:19:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:19:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:19:32 executing program 0: 02:19:32 executing program 2: 02:19:32 executing program 1: [ 794.499070][T17479] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 794.632903][T17482] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 02:19:33 executing program 4: 02:19:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:19:33 executing program 1: 02:19:33 executing program 4: 02:19:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:19:33 executing program 0: 02:19:33 executing program 2: 02:19:33 executing program 4: [ 795.232465][T17493] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 02:19:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:19:33 executing program 1: [ 795.577125][T17500] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 02:19:34 executing program 2: 02:19:34 executing program 0: 02:19:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:19:34 executing program 4: [ 796.079373][T17507] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 02:19:34 executing program 1: 02:19:34 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000004c0)=@filter={'filter\x00', 0xe, 0x4, 0x2e8, 0xffffffff, 0x100, 0x100, 0x100, 0xffffffff, 0xffffffff, 0x250, 0x250, 0x250, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa0, 0x100, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@loopback, [], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}, {{@ip={@private, @remote, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge0\x00'}, 0x0, 0x70, 0x98}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@mcast1, 'veth0_vlan\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x348) 02:19:34 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f00000006c0)=[{{&(0x7f0000000340)=@in6={0xa, 0x4e24, 0x0, @empty}, 0x80, 0x0}}, {{&(0x7f0000000000)=@l2tp={0x2, 0x0, @multicast2}, 0xb5, 0x0}}], 0x2, 0x1) [ 796.449128][T17514] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 02:19:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:19:35 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:19:35 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f00000004c0)=[{{&(0x7f0000000340)=@in={0x2, 0x4e22, @empty}, 0x80, 0x0}}], 0x1, 0x48814) 02:19:35 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f00000006c0)=[{{&(0x7f0000000000)=@in6={0xa, 0x4e23, 0x0, @mcast2}, 0x80, 0x0}}], 0x1, 0xc045) sendmsg$sock(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)="f8", 0x1}], 0x1}, 0x0) 02:19:35 executing program 0: syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='fd/4\x00') ioctl$EVIOCGSW(r0, 0x8040451b, 0x0) [ 797.020812][T17525] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 797.192047][T17528] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 02:19:35 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/bsg\x00', 0x511082, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000000)={0x20}, 0xfffffeee) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='fd/3\x00') read$FUSE(r1, 0x0, 0x0) 02:19:36 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) read$FUSE(r0, &(0x7f0000000080)={0x2020}, 0x2020) 02:19:36 executing program 1: syz_emit_ethernet(0x342, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000008100000086dd6a6d3a1003080601fe8000000000000000000000000000bbff0200000000000000000000000000010186d3fb6cc2d9d6de4c60b5c6"], 0x0) 02:19:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:19:36 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:19:36 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={0x0, @in={0x2, 0x0, @empty}, @in={0x2, 0x0, @multicast1}, @phonet, 0x4}) [ 798.125173][T17552] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 798.143551][T17554] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 02:19:36 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000140)={0x0, @l2tp={0x2, 0x0, @empty}, @l2tp={0x2, 0x0, @remote}, @qipcrtr, 0xec}) 02:19:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:19:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:19:37 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/raw\x00') read$FUSE(r0, &(0x7f0000000080)={0x2020}, 0x2020) read$FUSE(r0, 0x0, 0x0) 02:19:37 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x200000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x14, r2, 0x1}, 0x14}}, 0x0) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000280)={&(0x7f0000000180), 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x78, r2, 0x400, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x35}, @IPVS_CMD_ATTR_SERVICE={0x5c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x69}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x62}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x2f}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x4, 0x25}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7e}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x28, 0x1}}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x20000000}, 0x60080) socket$inet(0x2, 0x1, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x8) semctl$SETALL(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)=[0x9, 0x3, 0x5, 0x1000, 0x1, 0x0, 0xbca5, 0x5]) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r4, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0xc, r5, 0x1, 0x0, 0x6, @random="a9df42a82776"}, 0x14) ioctl$sock_SIOCADDRT(r3, 0x890b, &(0x7f0000000080)={0x0, @in={0x2, 0x0, @broadcast}, @can, @isdn={0x22, 0x7, 0x4, 0xe1, 0x2}, 0xfffc, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffeffffffffffffc}) [ 798.967535][T17572] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 798.973949][T17571] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 02:19:37 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @in={0x2, 0x0, @multicast2}, @phonet, @nl=@unspec}) 02:19:37 executing program 2: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r1 = socket$unix(0x1, 0x5, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='sockfs\x00', 0x0, 0x0) 02:19:37 executing program 0: syz_emit_ethernet(0x46, &(0x7f0000000000)={@local, @dev, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "8ba8b3", 0x10, 0x0, 0x0, @empty, @private2, {[@hopopts={0x0, 0x0, [], [@enc_lim]}]}}}}}, 0x0) 02:19:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf465", 0x33, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:19:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:19:38 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f00000006c0)=[{{&(0x7f0000000340)=@in6={0xa, 0x4e24, 0x0, @dev}, 0x80, 0x0}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000080)="ee", 0x1}], 0x1}}], 0x2, 0x8044) sendmsg$sock(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)="f8760f9d00d8bf41ba76ead8e2f52f1894109a5bd4a14aeaf1cb659994d9ff22b0e29efa3901140e9590ac1f4b096a56e1c1b3e48e94df6f4ef36926f5cb0bcb54b97f9271bcf63a0f113c36e42244ca48558d01a7b54e546288895d1cd48d2f", 0x60}, {&(0x7f0000000d00)="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", 0x574}], 0x2}, 0x0) 02:19:38 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x200000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x14, r2, 0x1}, 0x14}}, 0x0) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000280)={&(0x7f0000000180), 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x78, r2, 0x400, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x35}, @IPVS_CMD_ATTR_SERVICE={0x5c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x69}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x62}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x2f}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x4, 0x25}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7e}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x28, 0x1}}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x20000000}, 0x60080) socket$inet(0x2, 0x1, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x8) semctl$SETALL(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)=[0x9, 0x3, 0x5, 0x1000, 0x1, 0x0, 0xbca5, 0x5]) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r4, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0xc, r5, 0x1, 0x0, 0x6, @random="a9df42a82776"}, 0x14) ioctl$sock_SIOCADDRT(r3, 0x890b, &(0x7f0000000080)={0x0, @in={0x2, 0x0, @broadcast}, @can, @isdn={0x22, 0x7, 0x4, 0xe1, 0x2}, 0xfffc, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffeffffffffffffc}) 02:19:38 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000140)={0x0, @l2tp={0x2, 0x0, @local, 0x2}, @l2={0x1f, 0x4bc, @fixed={[], 0x12}, 0x6}, @qipcrtr={0x2a, 0x2, 0x3fff}, 0x4, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)='macvlan1\x00', 0x0, 0x0, 0x8}) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) [ 800.538287][T17603] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 800.715439][T17607] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 02:19:39 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f0000004d40)=[{{&(0x7f0000000340)=@in6={0xa, 0x4e24, 0x0, @dev}, 0x80, 0x0}}, {{&(0x7f0000000040)=@nl=@unspec, 0x80, 0x0}}], 0x2, 0x0) 02:19:39 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/bsg\x00', 0x511082, 0x0) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20}, 0x20) write$FUSE_IOCTL(r0, &(0x7f0000000000)={0x20}, 0xfffffeee) 02:19:39 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) sendmmsg(r0, &(0x7f0000000300)=[{{&(0x7f0000000000)=@in={0x2, 0x0, @empty}, 0x80, 0x0}}], 0x1, 0x710fa11362173b5f) 02:19:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:19:39 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) syz_emit_ethernet(0x5a, &(0x7f0000000840)=ANY=[], 0x0) 02:19:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf465", 0x33, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) [ 801.519666][T17620] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 02:19:40 executing program 4: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @dev, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "8ba8b3", 0x18, 0x0, 0x0, @empty, @private2, {[@hopopts={0x0, 0x1, [], [@enc_lim, @calipso={0x7, 0x8}]}]}}}}}, 0x0) [ 801.636882][T17625] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 02:19:40 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)={0x80000005}) syz_emit_ethernet(0x5a, &(0x7f0000000840)=ANY=[], 0x0) 02:19:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:19:40 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={0x0, @in={0x2, 0x0, @remote}, @in={0x2, 0x0, @broadcast}, @can, 0x4}) 02:19:40 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf465", 0x33, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:19:40 executing program 4: bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f00000001c0)={0x4}, 0x8) r0 = semget$private(0x0, 0x1, 0x48c) semctl$GETNCNT(r0, 0x4, 0xe, &(0x7f0000000000)=""/164) semctl$GETPID(r0, 0x0, 0xb, &(0x7f0000000000)=""/232) r1 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000140)={0x0, @l2tp={0x2, 0x0, @local}, @l2tp={0x2, 0x0, @dev, 0x4}, @qipcrtr={0x2a, 0x2, 0x4000}, 0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)='lo\x00', 0x0, 0x0, 0x2}) getsockname(r1, &(0x7f0000000200)=@l2tp={0x2, 0x0, @broadcast}, &(0x7f0000000280)=0x80) [ 802.283468][T17640] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 02:19:40 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x9, 0x3, 0x3e8, 0xf0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x318, 0xffffffff, 0xffffffff, 0x318, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@empty, 'macsec0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @loopback, [], [], 'ip_vti0\x00', 'dummy0\x00'}, 0x0, 0x100, 0x228, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@srh={{0x30, 'srh\x00'}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:inetd_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x448) 02:19:40 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f00000006c0)=[{{&(0x7f0000000000)=@in6={0xa, 0x4e24, 0x0, @mcast1}, 0x80, 0x0}}], 0x1, 0x8044) sendmsg$sock(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000200)="f8", 0x1}], 0x1}, 0x0) 02:19:40 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1}, 0x4) syz_emit_ethernet(0x52, &(0x7f0000002200)={@local, @remote, @val={@void}, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "5497a6", 0x18, 0x3a, 0x0, @private1, @private2, {[], @ndisc_na={0x88, 0x0, 0x0, 0x0, [], @empty}}}}}}, 0x0) 02:19:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf465", 0x33, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 802.508132][T17644] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 02:19:41 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) rt_sigprocmask(0x0, &(0x7f0000000100)={[0xfffffffffffe]}, 0x0, 0x8) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) tee(r2, r3, 0x8, 0x0) 02:19:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) [ 802.862430][T17655] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 02:19:41 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000140)={0x0, @l2tp={0x2, 0x0, @multicast1}, @rc, @qipcrtr, 0x17, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)='bridge_slave_0\x00'}) 02:19:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf465", 0x33, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:19:41 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @remote, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "8ba8b3", 0x0, 0x0, 0x0, @empty, @mcast1}}}}, 0x0) [ 803.262225][T17669] EXT4-fs (loop3): invalid first ino: 0 02:19:41 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=@security={'security\x00', 0xe, 0x4, 0x528, 0xffffffff, 0x0, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x490, 0x490, 0x490, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x1c8, 0x228, 0x0, {}, [@common=@inet=@policy={{0x158, 'policy\x00'}, {[{@ipv6=@empty, [], @ipv4=@multicast1}, {@ipv4=@multicast1, [], @ipv4=@broadcast}, {@ipv4=@empty}, {@ipv6=@loopback, [], @ipv4=@multicast1}], 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @random="ac9bb02747f4"}}}, {{@ip={@empty, @loopback, 0x0, 0x0, 'sit0\x00', 'wlan0\x00'}, 0x0, 0x1a8, 0x1d0, 0x0, {}, [@common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x588) 02:19:41 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f00000006c0)=[{{&(0x7f0000000340)=@in6={0xa, 0x4e24, 0x0, @dev}, 0x80, 0x0}}, {{&(0x7f0000000000)=@l2tp={0x2, 0x0, @multicast2}, 0x80, 0x0}}], 0x2, 0x8044) 02:19:41 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000140)={0x0, @l2tp={0x2, 0x0, @multicast2}, @rc, @qipcrtr={0x2a, 0x2, 0x4000}, 0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)='bridge_slave_0\x00'}) 02:19:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:19:42 executing program 4: syz_emit_ethernet(0x3e, &(0x7f0000000080)={@local, @remote, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "e54e52", 0x8, 0x0, 0x0, @remote, @ipv4={[], [], @broadcast}, {[@hopopts={0x29}]}}}}}, 0x0) [ 803.710168][T17677] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 02:19:42 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) sendmmsg(r0, &(0x7f0000000300)=[{{&(0x7f0000000000)=@in={0x2, 0x0, @empty}, 0x80, 0x0}}], 0x1, 0x710fa11362173b5f) sendmmsg(r0, &(0x7f0000007a40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 02:19:42 executing program 2: syz_emit_ethernet(0x37e, &(0x7f00000007c0)={@local, @link_local, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, '>\"x', 0x344, 0x2f, 0x1, @dev={0xfe, 0x80, [], 0x26}, @private1, {[@hopopts={0x2c, 0x10, [], [@hao={0xc9, 0x10, @remote}, @calipso={0x7, 0x30, {0x0, 0xa, 0x7, 0x0, [0x0, 0x7f, 0x8d, 0x4, 0x0]}}, @jumbo={0xc2, 0x4, 0x7}, @enc_lim={0x4, 0x1, 0x20}, @jumbo={0xc2, 0x4, 0x356b8f9f}, @calipso={0x7, 0x30, {0x0, 0xa, 0x0, 0x0, [0x3, 0x0, 0x7, 0x8, 0x9]}}]}], {{0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x880b, 0xaa, 0x0, [0x3], "2e3104424c5acd413b06876109e8289927576f796cda5ccb96e284dd164a83642766fc98b77af937b93cd73ed437757506cdf257921dfff967a1523c99b99fd19546f59dc7f502277c8474ae37a893123aff7a6b879ada0c498e6c24f75ab6c9f28e8a013c2310cd53e8a6f7a2b08da896c4002b81b4eefa6492d0b2e8817c624ae04c151c4815ae91d0c12c15e9d4da526e16334b542d61d9c1fd447372e0f212647b3c97821246f0da"}, {0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x800, [0x0, 0x0, 0xf6], "8dd23d5857a03e3c3598557e1dc835a2b9c5080f28c00b55232e2b88b4705a0079e45fade7b61e12aa6153f8a6e5cfd39fa838c87988503aaaf221cb549f8c1446cf800100859ce585616cef8e7c7e104088f2c1411a6114d258e44d67993a81bfa3fef7f959f998cd95fad7d3186ff5bcae4a5c85697b04e99919d691293d66eb8bfb1cc548ea73e1187763cfc92e7e39487d0e275bbd87a3f4e0fcd07683f4bee0c7e592f935b27dc4fcb5bef04d89c23a71e9de8b7cd7de326783e204d2359848"}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd, [0x7ff, 0x0, 0x9], "b34678b5851252b9375dc369aacdcd7e2d7429206140dfecb28ac894e91054de12f7add0f8204759c0802d2b6e62a1531a5f26dc865f947d6e9874b752582756b90903df31ba4971b64f3262043ac5b36256b760c27934705f9e56b1928bb7d5731cb78d7b1542c19d57"}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x2d, 0x1, 0x1, 0x3, 0x0, 0x5}, 0x1, {0x798}}}, {0x8, 0x22eb, 0x0, {{0x0, 0x2, 0x7, 0x2, 0x1, 0x2, 0x4, 0x6}, 0x2, {0xc7, 0x3, 0x3, 0x18, 0x0, 0x0, 0x3}}}, {0x8, 0x6558, 0x0, "329625b97d2be581cf5d7dda879214190f4e08fd117ef947348c1d8451b580867fe9e7d0fe0f39ffc12a3867c12d3edef3506b27afe06bf7c33dd7039f0fe7554b87895378cc5a9122662e0ec1b375281b3a18f1cecd12790f87e65808fdc909a2dec86903044a98f8ad4d76399081d49b4e5ab272d75923fe83ea2cd5e95c292301a111176e82e26d7d9207"}}}}}}}, 0x0) 02:19:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf465", 0x33, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 804.200893][T17691] EXT4-fs (loop3): invalid first ino: 0 02:19:42 executing program 1: syz_emit_ethernet(0x77, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb8100000086dd60d56dbe0001"], 0x0) 02:19:42 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x4}, 0x4) syz_emit_ethernet(0x22, &(0x7f0000000080)={@empty, @dev, @val={@void}, {@can={0xc, {{}, 0x0, 0x0, 0x0, 0x0, "24995b83081ba8eb"}}}}, 0x0) [ 804.343668][T17696] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 02:19:42 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/raw\x00') read$FUSE(r0, 0x0, 0x0) 02:19:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:19:42 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f00000006c0)=[{{&(0x7f0000000340)=@in={0x2, 0x4e22, @empty}, 0x80, 0x0}}], 0x4000000000000c3, 0x8044) sendmsg$sock(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000002c0), 0x188}, 0x0) 02:19:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:19:43 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f00000006c0)=[{{&(0x7f0000000340)=@in6={0xa, 0x4e24, 0x0, @dev}, 0x80, 0x0}}], 0x1, 0x8044) sendmsg$sock(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)="f8760f9d00d8bf41ba76ead8e2f52f1894109a5bd4a14aeaf1cb659994d9ff22b0e29efa3901140e9590ac1f4b096a56e1c1b3e48e94df6f4ef36926f5cb0bcb54b97f9271bcf63a0f113c36e42244ca48558d01a7b54e546288895d1cd48d2f", 0x60}, {&(0x7f0000000140)="f7e6be4900c3d76159c8ca4dfa8a47", 0xf}, {&(0x7f0000000d00)="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", 0xada}], 0x3}, 0x0) 02:19:43 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x4}, 0x4) syz_emit_ethernet(0x22, &(0x7f0000000080)={@empty, @dev, @val={@void}, {@can={0xc, {{}, 0x0, 0x0, 0x0, 0x0, "24995b83081ba8eb"}}}}, 0x0) 02:19:43 executing program 4: syz_emit_ethernet(0x3a, &(0x7f0000000200)={@local, @remote, @val={@void}, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @private=0xa010102, @loopback}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 805.079107][T17712] EXT4-fs (loop3): invalid first ino: 0 [ 805.178706][T17715] EXT4-fs (loop5): invalid first ino: 0 02:19:43 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f00000006c0)=[{{&(0x7f0000000340)=@in={0x2, 0x4e22, @empty}, 0x80, 0x0}}], 0x4000000000000c3, 0x8044) sendmsg$sock(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000002c0), 0x188}, 0x0) 02:19:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:19:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:19:44 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f00000006c0)=[{{&(0x7f0000000340)=@in={0x2, 0x4e22, @empty}, 0x80, 0x0}}], 0x4000000000000c3, 0x8044) sendmsg$sock(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000002c0), 0x188}, 0x0) 02:19:44 executing program 1: mount$fuseblk(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 02:19:44 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x4}, 0x4) syz_emit_ethernet(0x22, &(0x7f0000000080)={@empty, @dev, @val={@void}, {@can={0xc, {{}, 0x0, 0x0, 0x0, 0x0, "24995b83081ba8eb"}}}}, 0x0) [ 805.921151][T17730] EXT4-fs (loop5): invalid first ino: 0 02:19:44 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000140)={0x0, @l2tp={0x2, 0x0, @empty}, @l2tp={0x2, 0x0, @remote}, @qipcrtr, 0x17, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)='bridge_slave_0\x00'}) [ 806.071396][T17734] EXT4-fs (loop3): fragment/cluster size (65536) != block size (4096) 02:19:44 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) r2 = gettid() r3 = gettid() r4 = socket$packet(0x11, 0x3, 0x300) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r4, &(0x7f0000000080)={r1}) 02:19:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:19:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:19:44 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @in={0x2, 0x0, @remote}, @in={0x2, 0x0, @local}, @phonet={0x23, 0x8, 0x0, 0x7}, 0xdfd, 0x0, 0x0, 0x0, 0x4}) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000280)='./file0\x00', r2, r1) r3 = getgid() mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x202000, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[], [{@smackfsroot={'smackfsroot', 0x3d, '\\'}}, {@measure='measure'}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x37, 0x66, 0x0, 0x32, 0x38, 0x61, 0x66], 0x2d, [0x64, 0x30, 0x30, 0x35], 0x2d, [0x39, 0x66, 0x32, 0x31], 0x2d, [0x33, 0x65, 0x32, 0x36], 0x2d, [0x30, 0x62, 0x66, 0x66, 0x35, 0x62, 0x61, 0x39]}}}, {@measure='measure'}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@measure='measure'}, {@context={'context', 0x3d, 'root'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x88\\'}}, {@audit='audit'}]}}) 02:19:45 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x4}, 0x4) syz_emit_ethernet(0x22, &(0x7f0000000080)={@empty, @dev, @val={@void}, {@can={0xc, {{}, 0x0, 0x0, 0x0, 0x0, "24995b83081ba8eb"}}}}, 0x0) [ 806.766991][T17751] EXT4-fs (loop5): invalid first ino: 0 02:19:45 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/unix\x00') read$FUSE(r0, &(0x7f0000000080)={0x2020}, 0x2020) 02:19:45 executing program 2: syz_emit_ethernet(0x28b, &(0x7f00000007c0)={@local, @link_local, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, '>\"x', 0x251, 0x2f, 0x1, @dev, @private1, {[], {{0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x880b, 0xab, 0x0, [0x3], "2e3104424c5acd413b06876109e8289927576f796cda5ccb96e284dd164a83642766fc98b77af937b93cd73ed437757506cdf257921dfff967a1523c99b99fd19546f59dc7f502277c8474ae37a893123aff7a6b879ada0c498e6c24f75ab6c9f28e8a013c2310cd53e8a6f7a2b08da896c4002b81b4eefa6492d0b2e8817c624ae04c151c4815ae91d0c12c15e9d4da526e16334b542d61d9c1fd447372e0f212647b3c97821246f0da91"}, {0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x800, [0xe000, 0x0, 0xf6]}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd, [0x7ff, 0x0, 0x9], "b34678b5851252b9375dc369aacdcd7e2d7429206140dfecb28ac894e91054de12f7add0f8204759c0802d2b6e62a1531a5f26dc865f947d6e9874b752582756b90903df31ba4971b64f3262043ac5b36256b760c27934705f9e56b1928bb7d5731cb78d7b1542c19d57827bcaa5badeba0afef4c70533ed4be4c624dfc0d64f2eaa9efb0dde0dbde4dd796b0b7ac7294ce519db830af82a1781acde508aff43095777740d426c14e813d46b97efcd47769389257a6979804bf86256d5a8c1e9e88326546928"}, {0x8, 0x88be, 0x0, {{0x3, 0x1, 0x2d, 0x1, 0x1, 0x3, 0x0, 0x5}, 0x1, {0x798}}}, {0x8, 0x22eb, 0x0, {{0x0, 0x2, 0x7, 0x2, 0x1, 0x2, 0x4, 0x6}, 0x2, {0xc7, 0x0, 0x3, 0x18, 0x0, 0x0, 0x3}}}, {0x8, 0x6558, 0x0, "329625b97d2be581cf5d7dda879214190f4e08fd117ef947348c1d8451b580867fe9e7d0fe0f39ffc12a3867c12d3edef3506b27afe06bf7c33dd7039f0fe7554b87895378cc5a9122662e0ec1b375281b3a18f1cecd12790f87e65808fdc909a2dec86903044a98f8ad4d76399081d49b4e5ab272d75923fe83ea2cd5e95c292301a111176e82e26d7d9207002a"}}}}}}}, 0x0) [ 806.931978][T17755] EXT4-fs (loop3): fragment/cluster size (65536) != block size (4096) 02:19:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:19:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x4, 0x2b8, 0xffffffff, 0x188, 0x188, 0x188, 0xffffffff, 0xffffffff, 0x220, 0x220, 0x220, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x98, 0xc0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x20}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0xa0, 0xc8, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0x70, 0x98}, @REJECT={0x28, 'REJECT\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) 02:19:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:19:45 executing program 0: socket$packet(0x11, 0x3, 0x300) syz_emit_ethernet(0x22, &(0x7f0000000080)={@empty, @dev, @val={@void}, {@can={0xc, {{}, 0x0, 0x0, 0x0, 0x0, "24995b83081ba8eb"}}}}, 0x0) 02:19:46 executing program 4: syz_emit_ethernet(0xd6, &(0x7f00000007c0)={@local, @link_local, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, '>\"x', 0x9c, 0x2f, 0x0, @dev, @private1, {[@hopopts={0x0, 0x9, [], [@hao={0xc9, 0x10, @remote}, @calipso={0x7, 0x30, {0x0, 0xa, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, @jumbo]}]}}}}}, 0x0) 02:19:46 executing program 2: mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000000)='.\x00', 0x0, 0x15400, 0x0) [ 807.766766][T17774] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 02:19:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 807.903980][T17777] EXT4-fs (loop3): fragment/cluster size (65536) != block size (4096) 02:19:46 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000140)={0x0, @l2tp={0x2, 0x0, @empty}, @l2tp={0x2, 0x0, @multicast2}, @qipcrtr, 0x17}) 02:19:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:19:46 executing program 0: socket$packet(0x11, 0x3, 0x300) syz_emit_ethernet(0x22, &(0x7f0000000080)={@empty, @dev, @val={@void}, {@can={0xc, {{}, 0x0, 0x0, 0x0, 0x0, "24995b83081ba8eb"}}}}, 0x0) 02:19:46 executing program 2: syz_emit_ethernet(0x1e81, &(0x7f0000000080)={@empty, @local, @val, {@ipv6={0x86dd, @udp={0x0, 0x6, "3ba557", 0x1e43, 0x11, 0x0, @remote, @private0, {[@hopopts={0x0, 0x1c6, [], [@jumbo, @jumbo, @hao={0xc9, 0x10, @empty}, @pad1, @pad1, @generic={0x0, 0xe0b, "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"}]}], {0x0, 0x0, 0x1003, 0x0, @opaque="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"}}}}}}, 0x0) 02:19:46 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f00000006c0)=[{{&(0x7f0000000340)=@in6={0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0x35}}, 0x80, 0x0}}], 0x1, 0x8044) sendmsg$sock(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)="f8760f9d00d8bf41ba76ead8e2f52f1894109a5bd4a14aeaf1cb659994d9ff22b0e29efa3901140e9590ac1f4b096a56e1c1b3e48e94df6f4ef36926f5cb0bcb54b97f9271bcf63a0f113c36e42244ca48558d01a7b54e546288895d1cd48d2f", 0x60}, {&(0x7f0000000140)="f7e6be4900c3d76159c8ca4dfa8a47", 0xf}, {&(0x7f0000000d00)="3b8e8eb047d41cfeccc64f5ef8e89e5dd2f374f1addf8cfe4b070d5d64c3b00d1b09456e23ddf5c72ad39407e576ab677d9cf2e586df1123321264d6abc85f49e814d58b32c8171b282aadee42803a0abb62fe24d20f0dc0ed3a16b538d68a7d73644480c153284cd39b6f9e01004346e2145539b46393f2141ee1a5d1fcff096a8eadcf963d06c58bc57f3b874307ec9254a6f2561c552c87b727dbcbf29f161ef9a83cc391257ef15b3d9d70092038df51968520c34344a5621695d81519a81962c891bef7dc2adc2fc808fb0a8c9c19deb8d1289ef0ca66423fc9aa9a3ccc041e9512fd76bda1435bf17cfc21472d183a7cbd623e7aa8a1c6b9f05bd6086abd687dae80e1309895949b6905ef6057fe03694213b0b9515b931e54d5cab926619fe2f7b53023ec70106de695854659dc49f4910dfd06a825c3a16a9c435dccf58e7c5c5d1ab407363c8e53807d50fbfa2a55e6143dddde2ebd32799274ac61ff0ec6fb16e43b566da36564ae689ea90eb2113eb7828971569ca0977ce51cb6344a6e7a0e53114ea8dcf7292b7b43059d661fe5e8617c69618b22fba948a7ba8a379f527254f3c6fcda3777d0923b96804091ec73795922c7209958d74b831c83164a46105f1b2f491a9d6392810571aac22149ac2a5ac564ef1a923bf6ade376770a9f31afbc1f7cc73bb5d8479a158c46d80cfdd658b2d15bef011657f6e877022c4723fbd253a7c3769b8e55100a7fccfe0d5aa02d3902eb765c1de97df4376d525dac3aa6845c26e7d8d4673b751d9caef333eb1545313b59c273962dfba831ac7d1b6a1adb365422eb7a942a1b15f65254bdb6e37e5431c6d629e7388c8a89db9dbb303caaa57d1c2a6231d17f5473ff74daa3e2875d7a00c9275f75bab35320341bad49b344eaa4860e284c9952262ff55a207643600cb3a3f18ac42b1a73f252ae007ca4930e79647be452621d885b72618015e001138f6f4e5a0faffbc4c0523f9bc62dbd37bf9a591b926630d94fffa9a452304e2bc06f60918b70005792b886b2f0e58ae32ba1d542e340371d6961bc87db44d7a3a207a8775db90e34829c9e2254490d0ef95f0b368fd53a0e874d0a664077b5be584eb0a8fd296c475ebc0437cb0a69cbf47267aa8596d3ef3f7bfb9d040dc79cef917311344093b2afab69f08c58a022b755e4bac4453624ef0fbc9613bba1ef447ec283ffe78492a4d336ee4e7913ef9bcbc5893e3690f3ccee4e7482973dc3d1f2f41c57321e376ab5a5fe905397ca60964e6db95203a8e52e3221556e77e65541c96cf44228cf838d100e27ad80ef6033204286bf566f5906908bdfab62c5880cd928465170e48372569cd6828467773ed8ec041e610c0277d4c80d1cca5ece3b8076d2c6b09f535e52bbf3fa0c4555eceaa39729d7203d7a19021b5171acdfd4ea7dfd6d77d66fdcb5af4ed81e0f1b7399e30edefaa020f515f8441c6aa767d1ab8e5313ec845598ad269689925322ebd0b61aa7ec8e900ae75efc2ffa845d2f68158dfb0dde8e702ab8bc81d40351c8d90e26c1866cbfac81c1a35eb49024cdaddaa33c47636c120a8ee9ba7f178ad3d4d28d7eb482a0fe7463285165894cb8b5427e75a3e2517828f4f9dfbd259ca65a309174cecc2a9ea0ba43c18ef08dd42d7b696183b02601984cfd8cc29ad2d0d5f38809387b234044f48d7cde46c5891a58cf1048310d1537cc3584287ff0eb3daaa79ac570595e16382333fd84319f9d4ea7b87281411d251e7c52076fe4dc63cd1025ede095ad7ec9fe5407bfe94677afcfb29cc973eb7b96a7ae60eb115ab93cdf1bf6d349d15cca9050ecad7e69cea9930aa2baf36091dc2602532942c1ed3df584ed3c84ff3d0056e4b553c3827d5c271bff7e4617bcd7448713252633724b55c419773f4af805fc9425770af94037c835f508095dcfd60bb16cadf02f043db0dd4bceb176784b069f78d7663a7cd2fcfac5123fa4353f6e921c59fbb3633ad85164e25e4c152d01c07badb610b78e7025277d77948f2d12e4e44545728ef1c1a08673bfe297ab079e7b07189454d4db0c9cdd4e592f936da06b79128b12588f5f0415205b8ab9647348fa71e40795ddc5d22f25fe5ca78cbbfe5d1b7f0c57a0aa6158af733f7b8cf4385cb0ae49570f38f4706da6bca6777e4367f20a89fe6f2622f6d003775a420a74e9f7ea83ff8e50ff7a459f6d334d14b764ec5656d2c8f416a532c8299ef9f0612264c237bf04a524409ad7ba30fa632a0a40ad261585fe3c3df9601ad829b634f2fa10b070b9cd9b8954f5fa46de1ba340eaa3dd4f15c2d516fe1e5613f27559d47f9bbe57509d62a0675e9d0fd599f39bc236f19779e889561c2703326f6816798964c8f036e62ff3538805d2aed5c3cc758f1edd4ff692e72af956328bc6740813f24d322e0803f285ca71816686b606dbec66e1538f8f3cdbc2bd57e4d22ab832c7cd90ce3242558d484f83982198e5a0cb15980aac92fccdc6b9a0681aab8b3248fb76b9245b875948bf3c074f8f0a2d86a2d16148b317b1b19b492255c509f00d62590eb8572f0b08d0acde6a8964d435952b9a53c158d85cd891664a99e80389a4fd8b3a7558c357e6a6f0006045ffc88f47e4f285b9ee19a0b98402231351b85df6c722c8af2874f7c1878aa1454db34d908bafa0e45ab1bf8a97cac821aab84d7059b77cc9778ffa7c16459e9b956cd9b3db3ed9e79fa45ef4f38aedb71d409218b27967cf6dd9fe48b9828d3cadfbaf1eb54f5d6f3e4b8e0166d34dcec6b6c6e71345ff9b45f9cf61e4f8746437172ffd1079d7b469fe157720df5e1c4157be62dc18a2cfe111022be9002c256b9502a6e23315a0a2a276514414ce4ef5575a85be322a09915cf3cc844d60f1fdc139bc163f971b69f0f4c7db8257a89f815b7ddefe250271e04408e98dcfd8940365f2b913cd788a96c134202764fa49dbcb73f06c83e6573503644c65a8b46810e145a8ec9225cb03d2739a285d10f4481f9e80d963f260aabf1738c869151ddab6cc1ce91899b29fcf39ccfb739930d0b2dbe18b2ae684c7e40c9f4e2eb578018b1564705daf91a02df36c7767035dcd2cdd58ff7f74be59d559571e942d6443551817efb6613088b128ffed75884d5d6c69eb51d9b26439926c1c09143772a405dca9e95cfdba9b0dc1d73dccf3fff66e809b73193e13060eea11147a215332ef384b656fbff6e5437193ff7ab5893485388d11266829a774252708e144de1435aa7c51195403e78f7f93f85573e44af368c51a311de6da715a4e918832940663ae0d6e3b00c52e3828db134601a062943324fc695ac0da195a55b80c04c65e74d520836950ad10d56c7ff8f1dafd64869a690473eb6d8b40dac329338a97961981e634f114a3fbf4e16dfdd25a238034c584741824a1824caea4555f48cec6fb4c2fa2e403425c594b573837313e1dfe1750dac8200677461df4ccbd66cbec1411cfddb96d8e5e135a5b7a32e5e5c23a1c3adf9edfd5284a38b2a033c23b9aeef7188c35336323c32937e52bbff0bf145e9426b2d38cb517230776d86260d9a94abf745ab9e372fb0175fecb9761e64aa1b2b235dd98f52efdf4213c27b139523b88ea8065b4b7a9dbf974d6a7faa5fb48ef7ced5f4ed2487477075c8d8a144804e19ccf9b1cfb529239acadca8953693fc7b03d1d12c85921290839b197a20976673a9d0bfd372b5e6f2407015c20e433084a8dfaada1dc59b9dfe9ee9b36219cd9011fdcdc61521b5c1ad2d30cf214f77f0c3762f5e804de6f3cd6675d8872edd851eca3ba62b66cd50850a8249a3aecb8b2893b3846c1a5b0ffeda0412062a703e3009323d9ebe14651ddb1aeeb8b95ea32d01a184d764b22c5904fc09b8e56065378507ea5621634263963", 0xfee7}], 0x3}, 0x0) [ 808.442779][T17788] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 02:19:47 executing program 1: syz_emit_ethernet(0x92, &(0x7f0000000080)={@local, @remote, @val={@void}, {@ipv6={0x86dd, @generic={0x0, 0x6, "e54e52", 0x58, 0x0, 0x0, @remote, @ipv4={[], [], @broadcast}, {[@srh={0x0, 0xa, 0x4, 0x5, 0x0, 0x0, 0x0, [@private2, @mcast1, @private0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @remote]}]}}}}}, 0x0) 02:19:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 808.807610][T17797] EXT4-fs (loop3): fragment/cluster size (65536) != block size (4096) 02:19:47 executing program 0: socket$packet(0x11, 0x3, 0x300) syz_emit_ethernet(0x22, &(0x7f0000000080)={@empty, @dev, @val={@void}, {@can={0xc, {{}, 0x0, 0x0, 0x0, 0x0, "24995b83081ba8eb"}}}}, 0x0) 02:19:47 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={0x0, @in={0x2, 0x0, @empty}, @in={0x2, 0x0, @private}, @can, 0x4}) 02:19:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:19:47 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000140)={0x0, @l2tp={0x2, 0x0, @multicast1}, @rc, @qipcrtr, 0x17, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)='ip6erspan0\x00'}) 02:19:47 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) sendmmsg(r0, &(0x7f0000009040)=[{{&(0x7f0000000080)=@l2tp={0x2, 0x0, @remote}, 0x80, 0x0}}], 0x1, 0x710fa11362173b5f) [ 809.251555][T17808] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 02:19:47 executing program 0: setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x4}, 0x4) syz_emit_ethernet(0x22, &(0x7f0000000080)={@empty, @dev, @val={@void}, {@can={0xc, {{}, 0x0, 0x0, 0x0, 0x0, "24995b83081ba8eb"}}}}, 0x0) 02:19:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 809.602107][T17819] EXT4-fs (loop3): fragment/cluster size (65536) != block size (4096) 02:19:48 executing program 1: mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000100)='.\x00', 0x0, 0x2000, 0x0) 02:19:48 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/bsg\x00', 0x511082, 0x0) write$FUSE_LSEEK(r0, 0x0, 0x62) 02:19:48 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/unix\x00') read$FUSE(r0, &(0x7f0000000080)={0x2020}, 0x2020) read$FUSE(r0, 0x0, 0x0) 02:19:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) [ 809.960555][T17827] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 02:19:48 executing program 0: setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x4}, 0x4) syz_emit_ethernet(0x22, &(0x7f0000000080)={@empty, @dev, @val={@void}, {@can={0xc, {{}, 0x0, 0x0, 0x0, 0x0, "24995b83081ba8eb"}}}}, 0x0) 02:19:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:19:48 executing program 1: mount$fuse(0x0, &(0x7f0000000000)='.\x00', 0x0, 0x2a05810, 0x0) [ 810.319087][T17836] EXT4-fs (loop3): fragment/cluster size (65536) != block size (4096) 02:19:48 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000340)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb8100000086dd60"], 0x0) 02:19:49 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/unix\x00') read$FUSE(r0, &(0x7f0000000080)={0x2020}, 0x2020) read$FUSE(r0, 0x0, 0x0) [ 810.593987][T17844] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 02:19:49 executing program 0: setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x4}, 0x4) syz_emit_ethernet(0x22, &(0x7f0000000080)={@empty, @dev, @val={@void}, {@can={0xc, {{}, 0x0, 0x0, 0x0, 0x0, "24995b83081ba8eb"}}}}, 0x0) 02:19:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:19:49 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) r2 = socket$packet(0x11, 0x3, 0x300) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000000)) 02:19:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:19:49 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={0x0, @in={0x2, 0x0, @empty}, @in={0x2, 0x0, @private=0xa010102}, @can, 0x4}) [ 811.191372][T17861] EXT4-fs (loop3): fragment/cluster size (65536) != block size (4096) 02:19:49 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) connect(r0, &(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "1e0129c4d462bd4894718576b4fffd111079f9fe68fa7322e526c8a11cfe655e060e60d6c1ba6d80cf156d6ae84e0237e63227d7c3317189ac648a32d4a063"}, 0xb1) 02:19:49 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)={0x80000005}) epoll_wait(r1, &(0x7f0000000140)=[{}], 0x1, 0x4) 02:19:49 executing program 0: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x4}, 0x4) syz_emit_ethernet(0x22, &(0x7f0000000080)={@empty, @dev, @val={@void}, {@can={0xc, {{}, 0x0, 0x0, 0x0, 0x0, "24995b83081ba8eb"}}}}, 0x0) 02:19:49 executing program 1: syz_emit_ethernet(0x2fc, &(0x7f00000007c0)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, '>\"x', 0x2c2, 0x2f, 0x1, @dev={0xfe, 0x80, [], 0x26}, @private1, {[@hopopts={0x2c, 0x10, [], [@hao={0xc9, 0x10, @remote}, @calipso={0x7, 0x30, {0x0, 0xa, 0x7, 0x0, [0x24, 0x7f, 0x8d, 0x4, 0x8]}}, @jumbo={0xc2, 0x4, 0x7}, @enc_lim, @jumbo={0xc2, 0x4, 0x356b8f9f}, @calipso={0x7, 0x30, {0x1, 0xa, 0x0, 0x0, [0x3, 0x90, 0x0, 0x8, 0x0]}}]}], {{0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x94, 0x0, [0x3], "2e3104424c5acd413b06876109e8289927576f796cda5ccb96e284dd164a83642766fc98b77af937b93cd73ed437757506cdf257921dfff967a1523c99b99fd19546f59dc7f502277c8474ae37a893123aff7a6b879ada0c498e6c24f75ab6c9f28e8a013c2310cd53e8a6f7a2b08da896c4002b81b4eefa6492d0b2e8817c624ae04c151c4815ae91d0c12c15e9d4da526e1633"}, {0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [0x0, 0xf6], "8dd23d5857a03e3c3598557e1dc835a2b9c5080f28c00b55232e2b88b4705a0079e45fade7b61e12aa6153f8a6e5cfd39fa838c87988503aaaf221cb549f8c1446cf800100859ce585616cef8e7c7e104088f2c1411a6114d258e44d67993a81bfa3fef7f959f998cd95fad7d3186ff5bcae4a5c85697b04e99919d691293d66eb8bfb1cc548ea73e1187763cfc92e7e39487d0e275bbd87a3f4e0fcd07683f4bee0c7e592f935b27dc4fcb5bef04d89c23a71e9de8b7cd7de326783e204d2359848"}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd, [0x7ff, 0x9]}, {0x8, 0x88be, 0x0, {{0x3, 0x1, 0x2d, 0x1, 0x0, 0x3, 0x0, 0x5}, 0x1, {0x798}}}, {0x8, 0x22eb, 0x0, {{0x4, 0x2, 0x7, 0x2, 0x1, 0x0, 0x4, 0x6}, 0x2, {0xc7, 0x3, 0x3, 0x18, 0x0, 0x0, 0x3}}}, {0x8, 0x6558, 0x0, "329625b97d2be581cf5d7dda879214190f4e08fd117ef947348c1d8451b580867fe9e7d0fe0f39ffc12a3867c12d3edef3506b27afe06bf7c33dd7039f0fe7554b87895378cc5a9122662e0ec1b375281b3a18f1cecd12790f87e65808fdc909a2dec86903044a98f8ad4d76399081d49b4e5ab272d75923fe83ea2cd5e95c292301a111176e82e26d7d9207002a"}}}}}}}, 0x0) [ 811.546709][T17867] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 02:19:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:19:50 executing program 4: r0 = epoll_create1(0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000040)) 02:19:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:19:50 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000100)=""/129) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={0x0, @in={0x2, 0xfffc, @multicast2}, @in={0x2, 0x1, @loopback}, @hci, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}) 02:19:50 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f00000006c0)=[{{&(0x7f0000000340)=@in={0x2, 0x4e22, @empty}, 0x80, 0x0}}], 0x4000000000000c3, 0x0) 02:19:50 executing program 0: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x4}, 0x4) syz_emit_ethernet(0x22, &(0x7f0000000080)={@empty, @dev, @val={@void}, {@can={0xc, {{}, 0x0, 0x0, 0x0, 0x0, "24995b83081ba8eb"}}}}, 0x0) [ 812.206233][T17882] EXT4-fs (loop3): fragment/cluster size (65536) != block size (4096) 02:19:50 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) connect(r0, &(0x7f0000000100)=@un=@abs, 0x80) 02:19:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) [ 812.591901][T17890] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 02:19:51 executing program 0: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x4}, 0x4) syz_emit_ethernet(0x22, &(0x7f0000000080)={@empty, @dev, @val={@void}, {@can={0xc, {{}, 0x0, 0x0, 0x0, 0x0, "24995b83081ba8eb"}}}}, 0x0) 02:19:51 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0xa) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc6, 0x0, &(0x7f0000000280)="207ef39c5f55b0bda7a300babe2bfe12b33cda3cc0ff5c560ec27c70f6703395095409094409842daaeebb502e93df9323e5f226154350002b3bd49a662db4d7224bf2e3460f83db56199f630ae9dedc0040000000000000494aaa0902fcb47d8c19d5608f7b53ed9bb5d2a460d6b0d5505db31397a451ab42c97e9589340bebe4bffa20000000000000001d5d126e177816947d9b7a113b3c405ca2bcc022b9b39721e16728032d6bd3c43e309a9d93fe37de7d1ffbf854ccc47ad9888f2a2304dd859d1cb1"}, 0x48) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:19:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:19:51 executing program 1: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$setperm(0x5, r1, 0x1011210) keyctl$describe(0x6, r1, 0x0, 0x0) 02:19:51 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect(r0, &(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x80) sendto(r0, &(0x7f0000000280), 0xfe42, 0x0, 0x0, 0xf535ac1c6171ebf8) [ 813.103910][T17904] EXT4-fs (loop3): fragment/cluster size (65536) != block size (4096) 02:19:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c2000012", 0x65, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) [ 813.450104][T17919] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 813.531569][T17923] EXT4-fs (loop3): fragment/cluster size (65536) != block size (4096) 02:19:52 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect(r0, &(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @empty}, 0x80) sendto(r0, &(0x7f0000000080)="40a0", 0x2, 0x40810, 0x0, 0x0) 02:19:52 executing program 0: socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x4}, 0x4) syz_emit_ethernet(0x22, &(0x7f0000000080)={@empty, @dev, @val={@void}, {@can={0xc, {{}, 0x0, 0x0, 0x0, 0x0, "24995b83081ba8eb"}}}}, 0x0) 02:19:52 executing program 1: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clock_gettime(0x0, &(0x7f0000002440)={0x0, 0x0}) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_nanosleep(0x2, 0x0, &(0x7f0000000280)={0x0, r1+10000000}, 0x0) 02:19:52 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) connect(r0, &(0x7f00000000c0)=@nl=@proc={0x10, 0x0, 0x0, 0x2008202}, 0x80) 02:19:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:19:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c2000012", 0x65, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:19:52 executing program 0: socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x4}, 0x4) syz_emit_ethernet(0x22, &(0x7f0000000080)={@empty, @dev, @val={@void}, {@can={0xc, {{}, 0x0, 0x0, 0x0, 0x0, "24995b83081ba8eb"}}}}, 0x0) 02:19:52 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000001c0)=@delqdisc={0x24, 0x25, 0x1}, 0x24}}, 0x0) [ 814.523696][T17942] EXT4-fs (loop3): fragment/cluster size (65536) != block size (4096) 02:19:53 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect(r0, &(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x80) sendto(r0, &(0x7f0000000280)="76006ab8", 0x4, 0x0, 0x0, 0x0) [ 814.589256][T17944] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 02:19:53 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802182001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x6) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x166, 0x0, &(0x7f0000000100)="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"}, 0x48) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 02:19:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c2000012", 0x65, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:19:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c2000012", 0x65, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:19:53 executing program 0: socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x4}, 0x4) syz_emit_ethernet(0x22, &(0x7f0000000080)={@empty, @dev, @val={@void}, {@can={0xc, {{}, 0x0, 0x0, 0x0, 0x0, "24995b83081ba8eb"}}}}, 0x0) 02:19:53 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102040bfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0xb) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14b, 0x0, &(0x7f0000000240)="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"}, 0x48) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x14}}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 02:19:53 executing program 4: r0 = openat$apparmor_thread_current(0xffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000040)=@profile={'changeprofile ', '&:+.-#,\'\x00'}, 0x17) 02:19:53 executing program 2: read(0xffffffffffffffff, &(0x7f0000000200)=""/20, 0x14) [ 815.379331][T17964] EXT4-fs (loop3): fragment/cluster size (65536) != block size (4096) [ 815.466798][ T31] audit: type=1400 audit(1605061193.864:9): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name="&:+.-#,'" pid=17968 comm="syz-executor.4" [ 815.539414][T17970] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 02:19:54 executing program 4: mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 02:19:54 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000080)={@empty, @dev, @val={@void}, {@can={0xc, {{}, 0x0, 0x0, 0x0, 0x0, "24995b83081ba8eb"}}}}, 0x0) 02:19:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:19:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c2000012", 0x65, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:19:54 executing program 2: fchdir(0xffffffffffffffff) [ 816.068590][T17987] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 816.181461][T17991] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 02:19:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:19:54 executing program 2: nanosleep(&(0x7f00000003c0)={0x3}, 0x0) 02:19:54 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) chdir(0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000200)={'U-'}, 0x16, 0x1) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendfile(r0, r1, 0x0, 0x8400fffffffa) chroot(&(0x7f0000000240)='./bus\x00') socket(0x0, 0x80002, 0x0) sendfile(r0, r1, 0x0, 0xf0ff7f) 02:19:54 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000080)={@empty, @dev, @val={@void}, {@can={0xc, {{}, 0x0, 0x0, 0x0, 0x0, "24995b83081ba8eb"}}}}, 0x0) [ 816.564164][T17998] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 816.600227][ T31] audit: type=1804 audit(1605061194.994:10): pid=18003 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir283646612/syzkaller.c43Bqz/434/bus" dev="sda1" ino=15872 res=1 errno=0 [ 817.405445][ T31] audit: type=1804 audit(1605061195.794:11): pid=18007 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir283646612/syzkaller.c43Bqz/434/bus" dev="sda1" ino=15872 res=1 errno=0 [ 817.535067][ T31] audit: type=1804 audit(1605061195.924:12): pid=18014 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir283646612/syzkaller.c43Bqz/434/bus" dev="sda1" ino=15872 res=1 errno=0 02:19:56 executing program 1: 02:19:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c2000012", 0x65, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:19:56 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000080)={@empty, @dev, @val={@void}, {@can={0xc, {{}, 0x0, 0x0, 0x0, 0x0, "24995b83081ba8eb"}}}}, 0x0) 02:19:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)) 02:19:56 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev={0xac, 0x14, 0x14, 0x25}}, 0xc) 02:19:56 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) chdir(0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000200)={'U-'}, 0x16, 0x1) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendfile(r0, r1, 0x0, 0x8400fffffffa) chroot(&(0x7f0000000240)='./bus\x00') socket(0x0, 0x80002, 0x0) sendfile(r0, r1, 0x0, 0xf0ff7f) [ 818.586601][ T31] audit: type=1804 audit(1605061196.984:13): pid=18025 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir283646612/syzkaller.c43Bqz/435/bus" dev="sda1" ino=15864 res=1 errno=0 [ 818.822459][T18034] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 818.826666][T18037] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 02:19:57 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000), 0x4) syz_emit_ethernet(0x22, &(0x7f0000000080)={@empty, @dev, @val={@void}, {@can={0xc, {{}, 0x0, 0x0, 0x0, 0x0, "24995b83081ba8eb"}}}}, 0x0) 02:19:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, 0x0) 02:19:57 executing program 2: 02:19:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:19:57 executing program 1: 02:19:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, 0x0) 02:19:58 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000), 0x4) syz_emit_ethernet(0x22, &(0x7f0000000080)={@empty, @dev, @val={@void}, {@can={0xc, {{}, 0x0, 0x0, 0x0, 0x0, "24995b83081ba8eb"}}}}, 0x0) [ 819.699081][T18052] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 02:19:58 executing program 1: 02:19:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:19:58 executing program 4: 02:19:58 executing program 2: 02:19:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, 0x0) 02:19:58 executing program 2: 02:19:58 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000), 0x4) syz_emit_ethernet(0x22, &(0x7f0000000080)={@empty, @dev, @val={@void}, {@can={0xc, {{}, 0x0, 0x0, 0x0, 0x0, "24995b83081ba8eb"}}}}, 0x0) 02:19:58 executing program 1: [ 820.390746][T18065] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 02:19:58 executing program 2: 02:19:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 02:19:59 executing program 4: 02:19:59 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x4}, 0x4) syz_emit_ethernet(0x0, 0x0, 0x0) 02:19:59 executing program 1: 02:19:59 executing program 2: [ 821.370951][T18082] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 02:19:59 executing program 4: 02:20:00 executing program 3: 02:20:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, 0x0) 02:20:00 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x4}, 0x4) syz_emit_ethernet(0x0, 0x0, 0x0) 02:20:00 executing program 2: 02:20:00 executing program 1: 02:20:00 executing program 3: 02:20:00 executing program 4: 02:20:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, 0x0) 02:20:01 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x4}, 0x4) syz_emit_ethernet(0x0, 0x0, 0x0) 02:20:01 executing program 3: 02:20:01 executing program 2: 02:20:01 executing program 1: 02:20:01 executing program 4: 02:20:01 executing program 0: 02:20:01 executing program 2: 02:20:01 executing program 3: 02:20:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000012b00)="2000000000000000000000cdbe000041973840cb33", 0x15, 0x4c80}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, 0x0) 02:20:01 executing program 1: 02:20:02 executing program 0: 02:20:02 executing program 4: 02:20:02 executing program 1: 02:20:02 executing program 3: 02:20:02 executing program 2: 02:20:02 executing program 5: 02:20:03 executing program 0: 02:20:03 executing program 1: 02:20:03 executing program 3: 02:20:03 executing program 4: 02:20:03 executing program 2: 02:20:03 executing program 5: 02:20:03 executing program 1: 02:20:03 executing program 2: 02:20:03 executing program 0: 02:20:03 executing program 4: 02:20:03 executing program 3: 02:20:03 executing program 5: 02:20:04 executing program 1: 02:20:04 executing program 0: 02:20:04 executing program 2: 02:20:04 executing program 3: 02:20:04 executing program 4: 02:20:04 executing program 5: 02:20:04 executing program 1: 02:20:04 executing program 0: 02:20:05 executing program 2: 02:20:05 executing program 3: 02:20:05 executing program 4: 02:20:05 executing program 5: 02:20:05 executing program 1: 02:20:05 executing program 0: 02:20:05 executing program 3: 02:20:05 executing program 4: 02:20:05 executing program 2: 02:20:05 executing program 0: 02:20:05 executing program 5: 02:20:05 executing program 1: 02:20:06 executing program 4: 02:20:06 executing program 3: 02:20:06 executing program 2: 02:20:06 executing program 0: 02:20:06 executing program 1: 02:20:06 executing program 5: 02:20:06 executing program 3: 02:20:06 executing program 4: 02:20:07 executing program 0: 02:20:07 executing program 2: 02:20:07 executing program 5: 02:20:07 executing program 1: 02:20:07 executing program 3: 02:20:07 executing program 0: 02:20:07 executing program 4: 02:20:07 executing program 5: 02:20:07 executing program 2: 02:20:08 executing program 1: 02:20:08 executing program 4: 02:20:08 executing program 3: 02:20:08 executing program 0: 02:20:08 executing program 5: 02:20:08 executing program 2: 02:20:08 executing program 1: 02:20:08 executing program 4: 02:20:08 executing program 5: 02:20:08 executing program 3: 02:20:08 executing program 0: 02:20:09 executing program 2: 02:20:09 executing program 1: 02:20:09 executing program 4: 02:20:09 executing program 5: 02:20:09 executing program 3: 02:20:09 executing program 0: 02:20:09 executing program 2: 02:20:09 executing program 1: 02:20:09 executing program 5: 02:20:09 executing program 4: 02:20:10 executing program 3: 02:20:10 executing program 1: 02:20:10 executing program 2: 02:20:10 executing program 0: 02:20:10 executing program 3: 02:20:10 executing program 5: 02:20:10 executing program 4: 02:20:10 executing program 2: 02:20:10 executing program 1: 02:20:10 executing program 0: 02:20:11 executing program 3: 02:20:11 executing program 4: 02:20:11 executing program 5: 02:20:11 executing program 2: 02:20:11 executing program 1: 02:20:11 executing program 0: 02:20:11 executing program 3: 02:20:11 executing program 4: 02:20:11 executing program 5: 02:20:11 executing program 2: 02:20:11 executing program 1: 02:20:12 executing program 0: 02:20:12 executing program 3: 02:20:12 executing program 4: 02:20:12 executing program 5: mlock(&(0x7f0000ffd000/0x1000)=nil, 0x1000) munlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) 02:20:12 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, &(0x7f0000001280)=[{&(0x7f0000000000)="b1280dd7c862ef3506c103c38e2911aee533fa157f84297269019a195b9be7ea1abb9dc982ac5b5ff3c68df99263f89b6742f2164c8d1ed0079d90dc91234da75be3a04883e7cd082e3551d8d3f402cc790dccb7514c", 0x56}, {&(0x7f0000000100)="852c6b2df67dbaaa354a3fe95058d33fbb691265b5824241324ac3551463edb0c6c691020cd95d5a12a83caf19c01998b85849b99c818c535120ade3a44cc532247c6105f869ccc74ed12509372ef7eb5159c2f8747776087c79e6d1a6eed6eca7237f8f5cb810bf8488066a6e5b61298c5739110cbc1a533b15ee6f44d3c9", 0x7f}, {&(0x7f0000000180)="cd76f028bd7558b3c0579124d30f4f6705d836639d31c5bab95e9fafdf4bb0718369c20ecc68f56ec4b6a8cfa7bc647590b7330b9d093d769eaf9662356baf126ac7348092f7d3ee30f807af432ffd38423b9ca0f3e5212669a475c125bab7af44cc09af6ea19590b3b4954842a386994e08393ff4d9bab59fee4d7ed4d64b68f3f1720043f1057ef826ed2f522caebbc8ac2cee20e7f8369dbd84ea9f4059baa359be5cc8e6f61e1491256f93c9e72d26727079fb28a38d2a13f74c83a9e997fd778703f323abc871cdf0250fdbcac5e2abaeb3b3776df253ca2ed491e4799ff4a5ffdd466871fba9337c6fdea09b19151dcd9e30da275036a8a3e2dd3057d9d815e0b278096387409c85977519002029148afd7ba0c58572879991b2301f2dce7306bdfdba049480638aa78c00156def1f85588619abf10ef3096af152abd0bc7bb8ff68cd5fc7a047ce2dc7fb3b10bf60fbdd84b41c8900178937f9149f929b3a4dc0d9c852c054251108c44d9623da53802955e7d29b67c4fe0d9ef4cb9470166b2875fb9abd792e175e2cba09457d72769b73adf39f9853c1d4196de74c854a59884e13ae852f30217c8607824cd1f0e7dd2cd08487fba6b57316eead8775a95a3d81295df566fd08fa18fcb7b54f4fc35673de82aa0b33ca8ea4950736f2d928685de9c1acdba32301144c4d8b04aa28411e79b33450bd966a20a5662d1b22f62af8438264005068bc7b9588a19375966c05c92a116be5e84bc999956125217e56c4c971ea8ea9b6917c048ae12542ea7cc57a34ea6626516193342395fd4cd795180aa1b25c7d4e6b937ea9e5e1c837d252a3e34e37e41a98afe4340986b089b852dd68dce1913c5c46497ba46ad19eeaf19e830c1ef3d5f05474be1a8c9d624c914b5697510f93a5c903695c4ba4220832b371386d0f914dcadbcc740db2f30893469c24989f02050417a62a8722eb4c6d6f391729a4f147373db6c718daa0567ec161373c90eef7169c87fb90aee94e163bdefde3b37bdcd06465aaa7c14f0748795c7ad1f8621cba5350cfe21fc74950551f5f6a608ec3416e07f0e5c306f1281597c7c6762c2a3407d28c9f8b9bf1539bd0ad78f79cec66642d85181a78898fb1929bde5b0af826945e780dd4d531ce32bbc4b5bd7e4775f6a37f87241f31e53775dd1de29530012f4d38b2cbea0870405ad85bff602b9beb5882fac27bb0dcb52b23ebbc7c90b2b0045e1d11ae04591862da647b23ee8d65764a18708e9ba4f633036fa89b61f06ae2ae3912f6e8653d3c658a5b7a85f875d326d703a38bd6917a127f3c3d584905eb8cd4099077bcafd09c3b22d6fc19a3a94165d4e2c415c02f8e3d3aadb594cd60911a9804f53d515dc8fc3a9d8dece130f812fbd75e49b0f9572cfb12a897daaae31d1d5dc3b53c19f5cd92cc7b8aa29fd51a3ca7165cfeda4f8f8bdd15cac4bad9e1cca032c1ad9c936e7be94319e18e4836f9c91c1bb09137aa80f2b5e81e1a7dd4dc71eb67115c9dcfa8e9af8d2dca5151363c321b8fdf9768d9be9394c281a829b0663eab996cc69ab44cb6d5685c695aa8f6e34bf2a55a29c3bcdbc1238cebf7912e807a06c79708d307462948122a809b6872cdcb02f1841b0c9ff217479b8d03ed5416d8e09929c10a2f9514ffdffa11a70ef207f098e2d9c70d04a25ab5ef0fd6f52fb9e0b2f79ad5ed3d7e0e723c5dc2e254248cb22d777e1d459548131303bfd46399cc4d81122b012a53e8ed2e7de5954094e8afd890e06790563e7c9c35040911bbe96767bd49dc83634eb7961026f0095160b194d098d19230cc27f806891585961503f481d21453818bd2b381221ff423e5d8235c7300e0a1dd1ff71f48df58faae75ea265dc2194dc9c23f24e4b964c48c2d9631c5a403defdad70197f8c873bee49f7f79c00019cb3676b30a18f534360323cc7de80bda7f5fcf5f69a497e1c9f1d52c6b02240efa9a5066f1abd320ca2a5f213cb2eda87c020fe55cd36a5898fb8ae036381969697cfc0ad34d38c8bb6fe7cbff10b5ee34db1aae419174e4ddf4b98420463f95c2454776abfb2ab5adccb6e732a879d42dc2c83eb611bfab7fff02d50660c82bbdf6184a29f63cb969c3cf61d731b6b0d0122ff24654ad37df9730a5215d8dc647c158040c0da9b8ccd68a3a41592e26fef22c12688e3a0d9ed9cd46bcdb2743c7232fcdacb9ed5b524533ea13767e2b312a66bb777607052ece113c1e95fe21099f01bce7e91905151da70fdcff49dc331e6df9ce799f67db95abf63ac4f46a2b418e9172fdc8b628a7ed5d40d66c4bb7594330c63633cefd6cead260af7624cf02bf5be12b5f910534a9e457b98415b6c7e82775b82cf8eaa714ddcc3595ca5d812563b87e9c58421f8916d96f844183ec17f27ebdf6cf85250b2c875c673bb4ca75aa0c7650af3a8080f541ec68786481be5a5ea39b972f2e59f76ba53cfb06c5cc8eb5e2fe6fda8840c39f05924ca576c6472f6b53cac2fc6fd004c09306becfb33a7335851c316dc4cd2601a7a36196b245635ef937b3ec40378915310f0e22c808309dc082c8b1b1352881247bd508635bbaf2e38a203a66569a362bacaa14124504db8f55901c471f3287ab5208d36251fd78f4c79b8b997bad95258eb7bc7f6068df1ea562f4e2a58343f7f12caac1e732db573a1667fffa8e960e7508e2916552b588622c8fa2b2027ea983f6be74b3d9d6aafa7853e71fb0894e60a1daba36630c0475cbb41a21280c7385952492bd6c80f24b4cd19f02d6d9794f77faaf120b63e22cd2b8f179149326e68b7419df5e94681aa11fbcfbf775fb5302c4e8b00631d465b17e4f96aa494db90d06bb1962103b976b557876fbb86efbb99171998458341f2aaab85ef0cabec7d1c97e04dbf82a6310eae1e51355a769e8b91d5e409e04a7047ad382e002f95ed1d6618e19e0394071cb96b7a5e0bce271ed528d51f7ac4d4defac3d9850f6fbceca166899b2135eecd0c1787cb04de31350d76e5f9731c1ae25c5ead4cbbc2480e3ced7ee92dcbd8f203baf80aa97cf245c687ea12026b98f4a420370fcb14faf7f9e18db69caa7203dbbb158009fb322f86b5c9cf2ebc0182f63b40f0a55717f0fd488b00263e01b67ba44f61c669ec723c615bb35371af32a3edfd9332520a8cb2b65483f32ef99cd8b52289ac7f5e94ad00b0aae357d5f4af404a57b8ba21afaec5e78333abf1cc65c1bdc40039b4a227a6397fe787db6f46c41d67ff9e2d7c183e0578b17b93435d74fbb5806639257738a8b2c9764e3a1e033d18bce0bfba7036c01dc2533c56e623f281d0df0149e551761185013d8c29f35cd383d6259482471f8a5c26f49adcfa10e3b67a5cb8204899e2ede54ccb1ade78a1463bf79d5a63acd48dee5adee6d5f0005daca4758ebff65bf15957f30656420a5267cc787a8137184aa56e3e5a0ec499ca96b53b1b4a2f45abf5ab3775cfe48f3529886955a68d591ba874bb19b015934890d2dee703d57cea7d6e4fe1d3d88fe1d9349891af8e1026f4d82e324bd75d7b83e134a208e2ac0a15f7f3c7f9dd0c22eceb46e0eb9d1a5a8bdc1466ab48de3ec3d8cd5215f6a7ca8f66326f774184fc5a8cfdcdfd6f49a49c54f45f7432b4fcf71dd76e39f5449b7fa7225befbe2e24e81d7ac36c21ef3473884a09dd7a9ccded0c0d46719ade641e6a214f51c8875d60b06dfb7c7379cbfbb6941398aee3c23e6f3cae1b8da2cc4ed19f20cb07bbcf3396f3996d071c881ef4fae96b13d218e4c688733e6d8c1efd36071714d520954aca0a8d705efaeff976105f80b54ed87a86a1a14fa0b1dc1e8369023494d309868356a2a5e5517b9ac2b74ffc9ae96d675f95df3a9f0075368ad019c7fdd155919f0fcc66ed0348c26f7109d9dd820bd41efa207bc1917cbee97c4f6a5ba371767bda1630be7e567d19d3afdc7ae607551c72fba9baccd65c0dd250a79cee3655b4d515de151de5cb46e1d6bed908eee8cdc85f29b0c2bb54cff8e25c0765070783d08ec2bce873941b80d87d786bad837dcb7b731705460a68378b54343357ef9cbbd32df4ce8955ebd0e20d15c9c01202d71435fc5b00a66bfd593000ae82f0bb887bb4943f1e60922e141c81872108580e2b4120d193d75912fe2784cfb3d79f36bf345c2fe05b531c2b0996a5ff9794b05c0381e3fb2c859f03bb533824fe0f08e8c0dafcd8d0b95f6412174a4d653ea49f3b87d236c765dc95c79ee0246505baf98c0f2defd01571a60ac75a7efa062dcec2c1df5d9fb676c84ce430e9d74d997c57930b36ebfd438b1303263927b1962445756a7402b48ea2946baf1090be71188803d6744b172782653ae47f09349bd9eb5bff9a531a27b5af4ebbe222815e77ed3ad7b793830244b9ba83e8e83b25d8706fc6fe6a87e279b5899b5799c95db6198e7190231ecfe3d43373f630bdefd0cad4be5def885a48249212234c10d0d5837ea0f7559aca718ce5fda5a0c829c170f82fbec583ed1ed34aa5703f831b7a4d3155451b2263ef78c451bdc0e5e5a85a12c04e4b7ca36df490f305b005902cd07c4cdfb2c19938b29f1677933bbd247563a74ba970da2b6bcee77de459d711a75810f12ac24f48a999b6c5eaee78f866182e2a25d82c857b2a5da54805939d2dbdb1d8d4af15f67e9bbdaa6f78eee91d09702ab954ff771fe60dadbd7e533c0a96f10436b9038b3c7dd91770269eacb889790cff1c31ef803790761e180101c6efa3c20ac524019231598f001da2d9397eb695a110d26c9f5c2cf964c3525597efc644173e37bff39c91f0730bc50771e564ce9ef56e767fc269c9aa05d2cde5e7ba89a3d15f19212c80faf0156ff986463af4c64d7c2779f1ed04287057ec7e596bc3d9455b6b973ef829ed0bfe8e9152785fad52adb724ac1b41597bb9129c289b16391b5eb182bd5105078819c5282c7cf34bb01ac938602107321cb672b8b48207ded885f6acf2f0f0d6f284193278ebe74b3cc077cd794c8e6421aead5596f9897d4104361b212af53af861971e11b8de5e73b3d14ab7bfbbb97861afc41ae140e419b8128f6a3472eb611d8fc4dccdb96a134fcb291da13f1c2a1f2abbe5784a2170c23cb7dbb58a7c4be7c4c3a54c4278808e71e5c31b30dc9a99f96d45b4a193e49be670c69654abfae897cb0263c8f8a5e0cb2ba3ad22afe5244d0b4859b0e6c678d4b0644173fe46dfbe28e5820da4cb860e67dd0fa37c4f8d5c335dfecd77c99135e2fddad6404e49c75b4557d64bbcbf11f5329691f34ac1171c03e39c7d7c3681ea97a34cfe494c83e75b868b9e9463834394e19e16d85d9c44c924d18d1522a7af3505c2cf5cdd27", 0xee0}], 0x3) 02:20:12 executing program 1: munmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000) mincore(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 02:20:12 executing program 0: writev(0xffffffffffffffff, 0x0, 0xfffffffffffffe9c) 02:20:12 executing program 4: r0 = openat$ptmx(0xffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) fcntl$setown(r0, 0x6, 0x0) 02:20:12 executing program 3: openat$ptmx(0xffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) munmap(&(0x7f0000ffa000/0x6000)=nil, 0x6000) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x81010, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4, 0x1010, 0xffffffffffffffff, 0x0) socket(0x2, 0x0, 0x0) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x6) 02:20:13 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x11, &(0x7f0000000000), &(0x7f00000000c0)=0x4) 02:20:13 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001100)={0xffffffffffffffff}) socket$inet_sctp(0x2, 0x5, 0x84) pipe2(&(0x7f00000004c0), 0x0) pipe2(&(0x7f0000000340), 0x0) pipe2(&(0x7f00000004c0), 0x0) sendmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@rights, @cred, @rights], 0x40}, 0x0) 02:20:13 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=[@cred, @cred, @rights], 0x3c}, 0x0) 02:20:13 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2}, 0x10) 02:20:13 executing program 0: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x25, 0x0, &(0x7f00000000c0)) 02:20:13 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x100) 02:20:13 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$unix(r0, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=[@rights], 0x10}, 0x0) [ 835.466597][T18272] raw_sendmsg: syz-executor.4 forgot to set AF_INET. Fix it! 02:20:13 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001100)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x81) 02:20:14 executing program 5: pipe2(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) 02:20:14 executing program 4: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040), 0x4) 02:20:14 executing program 0: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) 02:20:14 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f00000004c0), 0x0) pipe2(&(0x7f00000004c0), 0x0) pipe2(&(0x7f00000004c0), 0x0) openat$ptmx(0xffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) socket$inet6_tcp(0x1c, 0x1, 0x0) sendmsg$unix(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[@rights, @cred, @rights], 0x38}, 0x0) 02:20:14 executing program 2: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0x401, 0x0, 0x0) 02:20:14 executing program 3: mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x3) 02:20:14 executing program 5: clock_gettime(0xa46dbc3334cfd5c9, 0x0) 02:20:15 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x1) 02:20:15 executing program 3: r0 = openat$ptmx(0xffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) flock(r0, 0x3) 02:20:15 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x20, &(0x7f0000000140), &(0x7f0000000200)=0x4) 02:20:15 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000000100)=ANY=[@ANYRES32=0xffffffffffffffff], &(0x7f00000001c0)=0x94) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x29, &(0x7f0000000200)={r2}, 0x8) 02:20:15 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x1a, &(0x7f0000000100), 0x8) 02:20:15 executing program 2: munmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000) mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x7) 02:20:15 executing program 4: syz_emit_ethernet(0x32, &(0x7f0000000000)={@broadcast, @empty, @val, {@arp={0x806, @generic={0x0, 0x0, 0x6, 0x0, 0x0, @broadcast, "", @local, "9e7ed1bc0b032fde355bd2f60a3417ee"}}}}, 0x0) 02:20:15 executing program 3: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x2}, 0x1c) 02:20:16 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = dup(r0) getsockname$unix(r1, 0x0, &(0x7f0000000580)) 02:20:16 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="0a012e2f6669"], 0xa) 02:20:16 executing program 5: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) getsockopt$inet6_int(r0, 0x29, 0x27, 0x0, &(0x7f00000000c0)) 02:20:16 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$sock_int(r0, 0xffff, 0x10000, &(0x7f0000000000), 0x4) 02:20:16 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000001100)=[{0x0}], 0x1}, 0x0) 02:20:16 executing program 0: setitimer(0x0, &(0x7f0000000040)={{0xfffffffa}, {0x20}}, 0x0) 02:20:16 executing program 1: connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs, 0xfffffffffffffd14) 02:20:16 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x1f, &(0x7f00000000c0)=0x9, 0x4) recvmsg(r0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=""/97, 0x61}, 0x0) 02:20:16 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) sendmsg$inet_sctp(r2, &(0x7f0000000300)={&(0x7f0000000180)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0, 0x0, &(0x7f0000000280)=[@prinfo={0x14}], 0x14}, 0x0) 02:20:16 executing program 4: writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000001c0)="3b246e0d14775f7341ab6eee725be97f8456a5e607a4597a7c05ce2c0d8f81a05a3d0655e0a9f4f41ffe84399f17b8c297ca084cd50ef619d124527d9f47d1336f33805f72fafce1fb11fc2b46787aaf94cb4e0f7bf80359fb73650104b263aea81d91bdefec41b5af4f73aa39bd5ba98651651b59632e425553e0ea5bb64d55d688065bdb11d54ddbb0ae006fe860cc6c8c2d1037398cae97336482da417b2166b2529c", 0xfffffffffffffc65}], 0x200000000000025e) 02:20:17 executing program 5: r0 = socket(0x1c, 0x3, 0x0) bind$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) 02:20:17 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 02:20:17 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0xa, &(0x7f00000001c0)={0x0, @in, 0x0, 0x0, 0x209}, 0xa0) 02:20:17 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_buf(r0, 0x0, 0x4a, &(0x7f0000000e00)="7eea47ece1e5d6f4d97067b6d5fdd66ee7cc4c12629c6bc176dd10a87daf7de53f2a207dc0d533c5821e3968704e80da478a867a9bed4b5e1467adc681d6902bf2c72939ec7a1474590a37f64fa0b47f3b39236e023b1a15e765ed3765848f3c816f6390b2f899aea60bffc60ed16acf58737c5b5c24a3b91d9fcc4ead1e6e03cdacf32f13928f67d49122231cad8de82da45617d1e17252", 0x98) 02:20:17 executing program 4: syz_emit_ethernet(0x5e, &(0x7f0000000000)={@random="d5cd0be60585", @random="d190cb56226a", @val, {@ipv4}}, 0x0) 02:20:17 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) recvmsg(r0, &(0x7f0000001500)={0x0, 0x0, 0x0}, 0x1) 02:20:17 executing program 5: utimensat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) 02:20:18 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000040)=@file={0xa}, 0xa) 02:20:18 executing program 1: read(0xffffffffffffffff, &(0x7f0000000040)=""/19, 0xfffffffffffffe49) 02:20:18 executing program 3: 02:20:18 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000080)={0x10, 0x2}, 0x10) 02:20:18 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) recvmsg(r0, &(0x7f0000001500)={0x0, 0x0, 0x0}, 0x1) 02:20:18 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@sndinfo={0x1c, 0x84, 0x4, {0x0, 0x2010}}], 0x1c}, 0x0) 02:20:18 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x20, &(0x7f00000000c0), 0x4) 02:20:18 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000040)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0, 0x0, &(0x7f0000000340)=[{0xc}], 0xc}, 0x0) 02:20:18 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xb) 02:20:19 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x2e, &(0x7f0000000100)={@loopback}, 0x14) 02:20:19 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, &(0x7f0000000480)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="a0", 0x1}], 0x4) 02:20:19 executing program 5: writev(0xffffffffffffffff, &(0x7f00000011c0)=[{&(0x7f0000000000)="242bc646c275", 0x6}, {&(0x7f00000010c0)="4422df0f1f4ca3cbae80fbd2dc24bc59c6d2ebb98dbb1e35de78add90a3b1c8cbac475a65f0efe1684db27e920a9244ad23195ff83415c5da5e8348e01040000000000007458a2ecdc087befa6259c85d5560ec9253eec", 0xfffffedf}], 0x2) 02:20:19 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=[@cred, @cred, @rights], 0x40}, 0x0) 02:20:19 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f00000000c0), 0x88) 02:20:19 executing program 4: mlock(&(0x7f0000001000/0x1000)=nil, 0x1000) socketpair$unix(0x1, 0x1, 0x0, 0x0) mlock(&(0x7f0000000000/0x2000)=nil, 0x2000) 02:20:19 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f00000000c0), &(0x7f0000000000)=0x94) 02:20:19 executing program 3: syz_emit_ethernet(0x13c, &(0x7f0000000180)=ANY=[@ANYBLOB="55aaf908eee0e495a58713ec88a8"], 0x0) 02:20:19 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x11, &(0x7f0000001c40), 0x4) 02:20:20 executing program 1: openat$ptmx(0xffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x420202, 0x0) 02:20:20 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x103, &(0x7f00000000c0)={0x0, 0x2, "30d6"}, &(0x7f0000000200)=0xa) 02:20:20 executing program 4: mlock(&(0x7f0000001000/0x1000)=nil, 0x1000) socketpair$unix(0x1, 0x1, 0x0, 0x0) mlock(&(0x7f0000000000/0x2000)=nil, 0x2000) 02:20:20 executing program 2: syz_emit_ethernet(0x82, &(0x7f0000000000)={@random="d5cd0be60585", @random="d190cb56226a", @val, {@ipv4}}, 0x0) 02:20:20 executing program 3: bind(0xffffffffffffffff, &(0x7f0000000040)=@in={0x10, 0x2}, 0xfffffffffffffdc2) 02:20:20 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x25, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0xf, &(0x7f00000000c0), &(0x7f0000000100)=0xc) 02:20:20 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000480)=ANY=[@ANYBLOB="10024e237f00000100"/136, @ANYBLOB="400000008c"], 0xa0) 02:20:20 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x74a6bf0b}, 0x14) 02:20:20 executing program 4: munmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000) munmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000) 02:20:21 executing program 2: mlock(&(0x7f0000ffd000/0x1000)=nil, 0x1000) mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1) 02:20:21 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$unix(r1, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@cred], 0x18}, 0x0) 02:20:21 executing program 1: getresgid(0x0, 0xffffffffffffffff, &(0x7f0000000040)) 02:20:21 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000ffff000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="18000000ffff000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\f'], 0x3c}, 0x0) 02:20:21 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) read(r0, &(0x7f000001a200)=""/102400, 0x19000) writev(r1, &(0x7f00000011c0)=[{&(0x7f0000000000)="242bc646c275", 0x6}, {&(0x7f00000010c0)="4422df0f1f4ca3cbae80fbd2dc24bc59c6d2ebb98dbb1e35de78add90a3b1c8cbac475a65f0efe1684db27e920a9244ad23195ff83415c5da5e8348e8424c13501ba37987458a2ecdc087befa6259c85d5560ec9253eec", 0x57}], 0x2) 02:20:21 executing program 0: sendmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000040)=@file={0xa}, 0xa, 0x0, 0x0, &(0x7f00000002c0)=[@cred], 0x18}, 0x0) 02:20:21 executing program 2: ppoll(0x0, 0x0, 0x0, 0x0, 0x0) madvise(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0) 02:20:21 executing program 5: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x1b, 0x0, &(0x7f00000000c0)) 02:20:22 executing program 1: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) setsockopt$inet6_buf(r0, 0x29, 0x1c, &(0x7f0000000800)="8aaac97a1ef41aed73861e1e230b9b52", 0x10) 02:20:22 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000100), &(0x7f0000001700)=0x4) 02:20:22 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x25, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x900, &(0x7f0000000280)={r2}, &(0x7f00000002c0)=0x8) 02:20:22 executing program 4: syz_emit_ethernet(0xa7, &(0x7f0000001c00)={@local, @local, @val, {@ipv6}}, 0x0) 02:20:22 executing program 5: sendmsg$unix(0xffffffffffffffff, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@cred, @cred, @rights], 0x3c}, 0x0) 02:20:23 executing program 0: syz_emit_ethernet(0x36, &(0x7f0000000180)={@random="d5cd0be60585", @local, @val, {@ipv6}}, 0x0) 02:20:23 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 02:20:23 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000180)={@random="d5cd0be60585", @random="d190cb56226a", @val, {@ipv6}}, 0x0) 02:20:23 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x25, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f0000000040)=0x8) sendmsg$inet_sctp(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@sndinfo={0x1c, 0x84, 0x4, {0x0, 0x0, 0x0, 0x0, r2}}], 0x1c}, 0x0) 02:20:23 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000240)={0x10, 0x2}, 0x10) 02:20:23 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f00000004c0), 0x0) pipe2(&(0x7f00000004c0), 0x0) pipe2(&(0x7f00000004c0), 0x0) openat$ptmx(0xffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) socket$inet6_tcp(0x1c, 0x1, 0x0) sendmsg$unix(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[@rights, @cred, @rights], 0x44}, 0x0) read(r0, &(0x7f0000000040)=""/33, 0x21) 02:20:23 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x1f, &(0x7f0000000000), 0x4) 02:20:23 executing program 4: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) getsockopt$inet6_int(r0, 0x29, 0x1b, 0x0, &(0x7f0000000100)) 02:20:23 executing program 5: poll(&(0x7f0000000040), 0x33, 0x0) 02:20:24 executing program 1: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x1c, 0x1c}, 0x1c) 02:20:24 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x1f, &(0x7f0000000080), &(0x7f0000000140)=0x4) 02:20:24 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendto$inet(r0, 0x0, 0x0, 0x80, &(0x7f0000000000)={0x10, 0x2}, 0x10) 02:20:24 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) sendmsg(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) 02:20:24 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@rights, @cred], 0x24}, 0x0) 02:20:24 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) recvmsg(r0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)=""/123, 0x7b}, 0x1) 02:20:24 executing program 2: r0 = openat$ptmx(0xffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) fchown(r0, 0x0, 0x0) 02:20:25 executing program 3: mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) munlock(&(0x7f0000ffc000/0x2000)=nil, 0x2000) 02:20:25 executing program 4: syz_emit_ethernet(0x4a, &(0x7f0000001c00)={@local, @local, @val, {@ipv6}}, 0x0) 02:20:25 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f00000011c0), &(0x7f0000001200)=0x10) 02:20:25 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x25, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f0000000040)=0x8) sendmsg$inet_sctp(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@sndinfo={0x1c}, @sndinfo={0x1c, 0x84, 0x4, {0x0, 0x200, 0x0, 0x0, r2}}, @prinfo={0x14}], 0x4c}, 0x0) 02:20:25 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x25, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x21, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, r4}, &(0x7f0000000100)=0x10) 02:20:25 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000000)=@abs={0x8}, 0xffffffffffffff66, 0x0, 0x0, &(0x7f00000002c0)=[@cred], 0x18}, 0x0) 02:20:25 executing program 3: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) recvmsg(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000500)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000000280)=""/253, 0xfd}, 0x1) 02:20:25 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000001140)=@un=@file={0xa}, 0xa) 02:20:26 executing program 0: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) writev(r0, 0x0, 0x0) 02:20:26 executing program 5: syz_emit_ethernet(0x36, &(0x7f00000000c0)={@local, @random="eb470b472ea9", @val, {@ipv6}}, 0x0) 02:20:26 executing program 1: munmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000) mprotect(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0) 02:20:26 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f00000000c0), &(0x7f0000000180)=0x94) 02:20:26 executing program 4: pipe2(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) 02:20:26 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000080)={0x1c, 0x1c, 0x2}, 0x1c) 02:20:26 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f00000016c0)=[{&(0x7f0000000600)=""/4096, 0x1000}], 0x1}, 0x82) 02:20:26 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000000c0), &(0x7f0000001700)=0x4) 02:20:27 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=[@cred, @cred], 0x30}, 0x0) 02:20:27 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2}, 0x10) 02:20:27 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_buf(r0, 0x0, 0x1, &(0x7f0000000dc0)='\b', 0x1) 02:20:27 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockopt$sock_int(r1, 0xffff, 0x100, 0x0, &(0x7f0000000100)) 02:20:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet(r0, &(0x7f00000000c0)="0e512dca15f610efb6a2cc586fb305a1a0c94a42911a9e6d3efc0c1598587d2881831602", 0x24, 0x0, &(0x7f0000000040)={0x10, 0x2}, 0x10) 02:20:27 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendto(r0, 0x0, 0x0, 0x0, &(0x7f00000010c0)=@in6={0x1c, 0x1c, 0x3}, 0x1c) 02:20:27 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) getsockname$unix(r0, &(0x7f0000001200), &(0x7f0000000140)=0x1002) 02:20:28 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) recvfrom$inet6(r0, 0x0, 0x0, 0x83, 0x0, 0x0) 02:20:28 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={0x10, 0x2}, 0x10) 02:20:28 executing program 3: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1c, 0x1c, 0x1}, 0x1c) 02:20:28 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x103, &(0x7f00000003c0)={0x0, 0x2, "7ec9"}, &(0x7f0000000480)=0xa) 02:20:28 executing program 1: syz_emit_ethernet(0x3e, &(0x7f0000000580)={@local, @random="eb470b472ea9", @val, {@ipv6}}, 0x0) 02:20:28 executing program 0: mincore(&(0x7f0000ffa000/0x3000)=nil, 0x3000, &(0x7f0000000000)=""/71) munlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3) 02:20:28 executing program 5: sendmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), 0x18}, 0x0) 02:20:29 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=[@cred], 0x18}, 0x0) 02:20:29 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000380), 0x80) 02:20:29 executing program 1: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)=@un=@abs={0x8}, 0x8) 02:20:29 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_AUTH_KEY(r2, 0x84, 0x13, &(0x7f0000000100)={0x0, 0x2, 0x1, '>'}, 0x9) 02:20:29 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto(r0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x3}, 0x1c) 02:20:29 executing program 5: r0 = openat$ptmx(0xffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) fchdir(r0) 02:20:29 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x8, &(0x7f00000000c0), 0x4) 02:20:29 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = dup(r0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x901, &(0x7f0000000200), 0x8) 02:20:30 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) read(r2, &(0x7f0000000240)=""/59, 0x3b) 02:20:30 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendto$inet(r0, &(0x7f0000000080)="875936885f1433cc2916148811452435605a42c0a145e0544b5f941695a872c12c98d449e28d1fbf77469b615dbc7372aea2982263504a45995a66bcfdef075f99cec90db4ed5dbeb8a0b1518f548f0a705c6831d9da026775b842ea84", 0x5d, 0x0, &(0x7f0000000100)={0x10, 0x2}, 0x10) 02:20:30 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$unix(r0, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@cred, @rights, @rights], 0x3c}, 0x0) 02:20:30 executing program 5: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x9, &(0x7f0000000140), 0x4) 02:20:30 executing program 3: mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x7) 02:20:30 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x26, &(0x7f0000001300), &(0x7f0000001340)=0x8) 02:20:30 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) 02:20:30 executing program 1: openat$ptmx(0xffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x1805c0, 0x0) 02:20:30 executing program 0: syz_emit_ethernet(0x106, &(0x7f0000000000)={@random="d5cd0be60585", @random="d190cb56226a", @val, {@ipv6}}, 0x0) 02:20:31 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet(0x2, 0x3, 0x0) poll(&(0x7f0000000040)=[{r1, 0x2000}, {r0, 0x4}], 0x2, 0x0) 02:20:31 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) sendmsg$inet_sctp(r2, &(0x7f0000001540)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x3}, 0x1c, &(0x7f0000001500)=[{&(0x7f0000000340)='F', 0x1}], 0x1}, 0x0) 02:20:31 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000001500)={0x0, 0x6510, 0xfffffff8}, 0x10) 02:20:31 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0x24, &(0x7f0000000180)='68', 0x2) 02:20:31 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet_mreqn(r1, 0x0, 0x0, 0x0, 0x0) 02:20:31 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x900, &(0x7f0000000140)={0x0, 0xd0}, 0x8) 02:20:31 executing program 2: syz_emit_ethernet(0x32, &(0x7f0000000000)={@broadcast, @empty, @val, {@arp={0x806, @generic={0x18, 0x0, 0x6, 0x0, 0x0, @broadcast, "", @local, "9e7ed1bc0b032fde355bd2f60a3417ee"}}}}, 0x0) 02:20:31 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000000), &(0x7f00000000c0)=0x14) 02:20:32 executing program 4: mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x3, 0x410, 0xffffffffffffffff, 0x0) 02:20:32 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_buf(r0, 0x0, 0x15, &(0x7f00000002c0)=""/68, &(0x7f0000000340)=0x44) 02:20:32 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f00000000c0)={0x10, 0x2}, 0x10) 02:20:32 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) recvmsg(r0, &(0x7f0000002480)={0x0, 0x0, 0x0}, 0x0) 02:20:32 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x25, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000100)={r2}, 0x10) 02:20:32 executing program 0: setitimer(0x0, &(0x7f00000001c0)={{}, {0xfffffffa}}, 0x0) 02:20:32 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x18, &(0x7f0000001540), 0x4) 02:20:32 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$sock_int(r0, 0xffff, 0x10, &(0x7f0000000100), 0x4) 02:20:32 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001600)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, &(0x7f0000000580)=[{&(0x7f0000000040)="f47114df9e829f675d6c422833743144ff779575", 0x14}, {&(0x7f0000000600)="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", 0xfed}], 0x2) 02:20:33 executing program 2: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) bind(r0, &(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2}, 0x1c) 02:20:33 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x9, &(0x7f00000007c0)=0x3, 0x4) 02:20:33 executing program 3: setreuid(0x0, 0xffffffffffffffff) pipe2(0x0, 0x0) 02:20:33 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$unix(r0, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights], 0x10}, 0x0) 02:20:33 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) recvfrom$inet(r0, 0x0, 0x0, 0x1, 0x0, 0x0) 02:20:33 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x9, &(0x7f00000007c0), 0x4) 02:20:33 executing program 0: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$sock_timeval(r0, 0xffff, 0x1005, &(0x7f0000000000), 0x8) 02:20:33 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=[@cred], 0x18}, 0x0) 02:20:33 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5, 0x1f}, 0x14) 02:20:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreqn(r0, 0x0, 0xc, &(0x7f0000000080)={@multicast2, @broadcast}, 0xc) 02:20:34 executing program 5: syz_emit_ethernet(0x5a, &(0x7f0000000000)={@random="d5cd0be60585", @random="d190cb56226a", @val, {@ipv4}}, 0x0) 02:20:34 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) getsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x3, &(0x7f0000000080), &(0x7f00000000c0)=0x8) 02:20:34 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f0000000240)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0, 0x0, &(0x7f0000000200)=[@sndinfo={0x1c, 0x84, 0x4, {0x0, 0x1500}}], 0x1c}, 0x0) 02:20:34 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) 02:20:34 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) 02:20:34 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 02:20:34 executing program 5: syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') 02:20:35 executing program 1: io_uring_setup(0x67e5, &(0x7f0000000000)) 02:20:35 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) r2 = socket$inet6_udplite(0x1c, 0x2, 0x88) ppoll(&(0x7f00000000c0)=[{r1, 0x1}, {r2, 0x57}], 0x2, 0x0, 0x0, 0x0) 02:20:35 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r1, 0x84, 0x902, &(0x7f0000000680), 0x4) 02:20:35 executing program 2: openat$ptmx(0xffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) openat$ptmx(0xffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x420202, 0x0) 02:20:35 executing program 4: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@random="d5cd0be60585", @random="d190cb56226a", @val, {@ipv6}}, 0x0) 02:20:35 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x200000, 0x0) 02:20:36 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x40) 02:20:36 executing program 0: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x0) getrusage(0x1, &(0x7f0000000740)) 02:20:36 executing program 2: socket$inet6(0xa, 0x0, 0xfff) 02:20:36 executing program 4: io_uring_setup(0x67e5, &(0x7f0000000000)={0x0, 0xa37c, 0x1, 0x0, 0x91}) getsockname$unix(0xffffffffffffffff, &(0x7f0000000940), &(0x7f00000009c0)=0x6e) 02:20:36 executing program 3: syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f00000003c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}}}}]}}, 0x0) 02:20:36 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x0, 0x0) 02:20:36 executing program 1: r0 = openat$ttynull(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttynull\x00', 0x80000, 0x0) ioctl$KDSETLED(r0, 0x4b32, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') msgget(0x1, 0x0) r1 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$TIOCL_SETVESABLANK(r1, 0x541c, 0x0) mq_notify(0xffffffffffffffff, &(0x7f00000004c0)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000500)) 02:20:36 executing program 0: openat$ttynull(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttynull\x00', 0x80000, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') 02:20:36 executing program 4: syz_usb_connect$printer(0x2, 0x2d, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x7, 0x1, 0x0, 0x0, "", {{{0x9, 0x5, 0x1, 0x2, 0x10}}}}}]}}]}}, 0x0) 02:20:36 executing program 2: r0 = getpid() getpgid(r0) r1 = getpid() getpgid(r1) modify_ldt$write2(0x11, &(0x7f0000000380)={0xffffffff}, 0x10) syz_usb_connect$cdc_ncm(0x1, 0x7f, &(0x7f00000003c0)={{0x12, 0x1, 0x200, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x6d, 0x2, 0x1, 0xb9, 0x0, 0x7f, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x9, 0x24, 0x6, 0x0, 0x1, "15d98d80"}, {0x5, 0x24, 0x0, 0x5}, {0xd, 0x24, 0xf, 0x1, 0x0, 0x0, 0x4, 0x1}, {0x6, 0x24, 0x1a, 0x0, 0xe}, [@call_mgmt={0x5, 0x24, 0x1, 0x3}, @mbim_extended={0x8, 0x24, 0x1c, 0x5, 0x6f}]}, {{0x9, 0x5, 0x81, 0x3, 0x3ff, 0xff, 0x0, 0x2}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x200, 0x7, 0x0, 0x80}}, {{0x9, 0x5, 0x3, 0x2, 0x400, 0x7, 0x0, 0x1}}}}}}}]}}, &(0x7f00000006c0)={0xa, &(0x7f0000000480)={0xa, 0x6, 0x0, 0x4, 0x3, 0x2, 0x8}, 0x51, &(0x7f00000004c0)={0x5, 0xf, 0x51, 0x6, [@ss_container_id={0x14, 0x10, 0x4, 0x8, "57dd232acdf05df742abd253738750b8"}, @ssp_cap={0x14, 0x10, 0xa, 0x42, 0x2, 0x5, 0x0, 0x5, [0x18f, 0x9ff0]}, @ss_container_id={0x14, 0x10, 0x4, 0x1, "2543d927a7a7b85e6dea589706727656"}, @ptm_cap={0x3}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0x4, 0x26, 0x6, 0x80}, @ptm_cap={0x3}]}, 0x6, [{0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x449}}, {0x4, &(0x7f0000000580)=@lang_id={0x4, 0x3, 0x440a}}, {0x4, &(0x7f00000005c0)=@lang_id={0x4, 0x3, 0x408}}, {0x4, &(0x7f0000000600)=@lang_id={0x4, 0x3, 0x455}}, {0x4, &(0x7f0000000640)=@lang_id={0x4, 0x3, 0x449}}, {0x4, &(0x7f0000000680)=@lang_id={0x4, 0x3, 0x2401}}]}) socket(0x21, 0x6, 0xd718) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000740)='/dev/mISDNtimer\x00', 0x40000, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/time\x00') [ 858.644170][ T8475] usb 4-1: new high-speed USB device number 13 using dummy_hcd 02:20:37 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x2000016, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, 0x0, 0x208e24b) 02:20:37 executing program 5: [ 858.907658][ T8475] usb 4-1: Using ep0 maxpacket: 8 02:20:37 executing program 1: [ 858.970471][ T8943] usb 5-1: new full-speed USB device number 13 using dummy_hcd [ 859.026081][ T8475] usb 4-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 859.037213][ T8475] usb 4-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 859.047319][ T8475] usb 4-1: config 1 interface 1 altsetting 1 endpoint 0x82 has invalid wMaxPacketSize 0 [ 859.057324][ T8475] usb 4-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 0 [ 859.067321][ T8475] usb 4-1: config 1 interface 1 altsetting 1 endpoint 0x3 has invalid wMaxPacketSize 0 [ 859.067865][ T3678] usb 3-1: new low-speed USB device number 13 using dummy_hcd [ 859.077232][ T8475] usb 4-1: config 1 interface 1 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 0 02:20:37 executing program 5: [ 859.244811][ T8475] usb 4-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 859.256431][ T8475] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 859.265236][ T8475] usb 4-1: Product: syz [ 859.269567][ T8475] usb 4-1: Manufacturer: syz [ 859.274405][ T8475] usb 4-1: SerialNumber: syz [ 859.334706][ T8943] usb 5-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 02:20:37 executing program 0: 02:20:37 executing program 1: [ 859.516298][ T8943] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 859.525851][ T8943] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 859.534292][ T8943] usb 5-1: Product: syz [ 859.538614][ T8943] usb 5-1: Manufacturer: syz [ 859.543365][ T8943] usb 5-1: SerialNumber: syz [ 859.615613][ T3678] usb 3-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 1023, setting to 8 [ 859.626950][ T3678] usb 3-1: config 1 interface 1 altsetting 1 endpoint 0x82 is Bulk; changing to Interrupt [ 859.637328][ T3678] usb 3-1: config 1 interface 1 altsetting 1 endpoint 0x3 is Bulk; changing to Interrupt [ 859.654384][ T8475] cdc_ncm 4-1:1.0: bind() failure [ 859.671950][ T8475] cdc_ncm 4-1:1.1: bind() failure [ 859.790631][ T8475] usb 4-1: USB disconnect, device number 13 [ 859.904689][ T3678] usb 3-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 859.915375][ T3678] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 859.923738][ T3678] usb 3-1: Product: Ј [ 859.927976][ T3678] usb 3-1: Manufacturer: 䐊 [ 859.932734][ T3678] usb 3-1: SerialNumber: ѕ [ 859.955603][ T8943] usb 5-1: USB disconnect, device number 13 [ 860.065177][T18905] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 860.384159][ T3678] cdc_ncm 3-1:1.0: bind() failure [ 860.415534][ T3678] cdc_ncm 3-1:1.1: bind() failure [ 860.429403][T10765] usb 4-1: new high-speed USB device number 14 using dummy_hcd [ 860.495034][ T3678] usb 3-1: USB disconnect, device number 13 [ 860.673834][T10765] usb 4-1: Using ep0 maxpacket: 8 [ 860.795391][ T8943] usb 5-1: new full-speed USB device number 14 using dummy_hcd [ 860.810314][T10765] usb 4-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 860.821902][T10765] usb 4-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 860.832098][T10765] usb 4-1: config 1 interface 1 altsetting 1 endpoint 0x82 has invalid wMaxPacketSize 0 [ 860.842387][T10765] usb 4-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 0 [ 860.852455][T10765] usb 4-1: config 1 interface 1 altsetting 1 endpoint 0x3 has invalid wMaxPacketSize 0 [ 860.862423][T10765] usb 4-1: config 1 interface 1 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 0 [ 861.184331][T10765] usb 4-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 861.193957][T10765] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 861.202807][T10765] usb 4-1: Product: syz [ 861.207548][T10765] usb 4-1: Manufacturer: syz [ 861.212295][T10765] usb 4-1: SerialNumber: syz [ 861.225659][ T8943] usb 5-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 02:20:39 executing program 3: 02:20:39 executing program 5: 02:20:39 executing program 0: 02:20:39 executing program 1: [ 861.354626][T10765] usb 4-1: can't set config #1, error -71 [ 861.384194][T10765] usb 4-1: USB disconnect, device number 14 [ 861.394746][ T8943] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 861.405244][ T8943] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 861.413425][ T8943] usb 5-1: Product: syz [ 861.418190][ T8943] usb 5-1: Manufacturer: syz [ 861.422934][ T8943] usb 5-1: SerialNumber: syz 02:20:40 executing program 4: 02:20:40 executing program 2: 02:20:40 executing program 5: 02:20:40 executing program 1: 02:20:40 executing program 0: [ 861.882941][ T8475] usb 5-1: USB disconnect, device number 14 02:20:40 executing program 3: 02:20:40 executing program 2: 02:20:40 executing program 1: 02:20:40 executing program 0: 02:20:40 executing program 5: 02:20:40 executing program 4: 02:20:40 executing program 3: 02:20:41 executing program 2: 02:20:41 executing program 1: 02:20:41 executing program 0: 02:20:41 executing program 5: 02:20:41 executing program 4: 02:20:41 executing program 3: 02:20:41 executing program 2: 02:20:41 executing program 1: 02:20:42 executing program 0: 02:20:42 executing program 5: 02:20:42 executing program 4: 02:20:42 executing program 3: 02:20:42 executing program 2: 02:20:42 executing program 0: 02:20:42 executing program 1: 02:20:42 executing program 4: 02:20:42 executing program 5: 02:20:42 executing program 3: 02:20:43 executing program 0: 02:20:43 executing program 2: 02:20:43 executing program 1: 02:20:43 executing program 4: 02:20:43 executing program 5: 02:20:43 executing program 3: 02:20:43 executing program 0: 02:20:43 executing program 2: 02:20:43 executing program 1: 02:20:44 executing program 4: 02:20:44 executing program 5: 02:20:44 executing program 0: 02:20:44 executing program 3: 02:20:44 executing program 1: 02:20:44 executing program 2: 02:20:44 executing program 4: 02:20:44 executing program 5: 02:20:44 executing program 3: 02:20:44 executing program 0: 02:20:44 executing program 2: 02:20:44 executing program 1: 02:20:45 executing program 1: 02:20:45 executing program 3: 02:20:45 executing program 2: 02:20:45 executing program 4: 02:20:45 executing program 0: 02:20:45 executing program 5: 02:20:46 executing program 1: 02:20:46 executing program 3: 02:20:46 executing program 2: 02:20:46 executing program 5: 02:20:46 executing program 0: 02:20:46 executing program 4: 02:20:47 executing program 3: 02:20:47 executing program 2: 02:20:47 executing program 1: 02:20:47 executing program 0: 02:20:47 executing program 5: 02:20:47 executing program 4: 02:20:47 executing program 2: 02:20:47 executing program 1: 02:20:47 executing program 0: 02:20:47 executing program 3: 02:20:47 executing program 4: 02:20:47 executing program 5: 02:20:48 executing program 2: 02:20:48 executing program 3: 02:20:48 executing program 1: 02:20:48 executing program 0: 02:20:48 executing program 5: 02:20:48 executing program 4: 02:20:49 executing program 3: 02:20:49 executing program 1: 02:20:49 executing program 2: 02:20:49 executing program 0: 02:20:49 executing program 4: 02:20:49 executing program 5: 02:20:49 executing program 3: 02:20:49 executing program 1: 02:20:49 executing program 0: 02:20:49 executing program 2: 02:20:49 executing program 4: 02:20:49 executing program 5: 02:20:50 executing program 3: 02:20:50 executing program 0: 02:20:50 executing program 2: 02:20:50 executing program 1: 02:20:50 executing program 4: 02:20:50 executing program 5: 02:20:50 executing program 3: 02:20:50 executing program 2: 02:20:50 executing program 0: 02:20:50 executing program 4: 02:20:50 executing program 1: 02:20:51 executing program 5: 02:20:51 executing program 3: 02:20:51 executing program 0: 02:20:51 executing program 4: 02:20:51 executing program 1: 02:20:51 executing program 2: 02:20:51 executing program 5: 02:20:51 executing program 3: 02:20:52 executing program 4: 02:20:52 executing program 1: 02:20:52 executing program 0: 02:20:52 executing program 2: 02:20:52 executing program 5: 02:20:52 executing program 3: 02:20:52 executing program 4: 02:20:52 executing program 0: 02:20:52 executing program 1: 02:20:52 executing program 2: 02:20:53 executing program 5: 02:20:53 executing program 3: 02:20:53 executing program 0: 02:20:53 executing program 4: 02:20:53 executing program 1: 02:20:53 executing program 2: 02:20:53 executing program 5: 02:20:53 executing program 3: 02:20:54 executing program 0: 02:20:54 executing program 4: 02:20:54 executing program 1: 02:20:54 executing program 5: 02:20:54 executing program 2: 02:20:54 executing program 3: 02:20:54 executing program 4: 02:20:54 executing program 0: 02:20:54 executing program 1: 02:20:54 executing program 5: 02:20:55 executing program 3: 02:20:55 executing program 2: 02:20:55 executing program 0: 02:20:55 executing program 4: 02:20:55 executing program 1: 02:20:55 executing program 5: 02:20:55 executing program 3: 02:20:55 executing program 2: 02:20:55 executing program 0: 02:20:56 executing program 4: 02:20:56 executing program 1: 02:20:56 executing program 5: 02:20:56 executing program 3: 02:20:56 executing program 2: r0 = socket(0x18, 0x0, 0x0) ioctl$PPPIOCGL2TPSTATS(r0, 0x80487436, 0x0) 02:20:56 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=[@rights={{0x14, 0x1, 0x1, [r1]}}], 0x18}, 0x0) 02:20:56 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00'}) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000040)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffff0606040000000000000000", 0x39}], 0x1) 02:20:56 executing program 1: syz_io_uring_setup(0x320f, &(0x7f0000000280), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000300), &(0x7f0000000340)) 02:20:56 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000380)='net/igmp\x00') read$FUSE(r0, &(0x7f00000006c0)={0x2020}, 0x2020) 02:20:56 executing program 3: syz_usb_connect$cdc_ecm(0x0, 0x6b, &(0x7f0000001240)={{0x12, 0x1, 0x201, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x59, 0x1, 0x1, 0x0, 0x0, 0x20, [{{0x9, 0x4, 0x0, 0x7, 0x3, 0x2, 0x6, 0x0, 0xf7, {{0xb, 0x24, 0x6, 0x0, 0x0, "1381ab1e7dcd"}, {0x5, 0x24, 0x0, 0x8}, {0xd, 0x24, 0xf, 0x1, 0x6986, 0x6, 0x20, 0x1f}, [@mbim={0xc, 0x24, 0x1b, 0x3, 0x5, 0x0, 0x6, 0x7, 0x5}, @network_terminal={0x7, 0x24, 0xa, 0x2, 0x5, 0x1, 0x3}, @obex={0x5, 0x24, 0x15, 0x4}]}, {[], {{0x9, 0x5, 0x82, 0x2, 0x20, 0x2, 0x52, 0x7}}, {{0x9, 0x5, 0x3, 0x2, 0x8, 0x7f, 0x40, 0xff}}}}}]}}]}}, &(0x7f0000001400)={0xa, &(0x7f00000012c0)={0xa, 0x6, 0x110, 0x8, 0x40, 0x7, 0x40, 0xfc}, 0x100, &(0x7f0000001300)={0x5, 0xf, 0x100, 0x4, [@ss_cap={0xa, 0x10, 0x3, 0x0, 0x3, 0x4, 0x0, 0x9}, @ss_container_id={0x14, 0x10, 0x4, 0x0, "26fdd2b5e7df3cc7edc33ccd39b59da1"}, @generic={0xbd, 0x10, 0x3, "1e10458ce0a919b2c2d27d9533a8f7e4dde45893fe4f3f719bb6550bf5f77084a6a54b03c35b1102c79595afaa11abdd9adced728647041e74fe52731fd6087818d4a6939494322101f136574459e7510090af051fe57e779b2f23e482851b8d5d53db8f94ed3c592a9eb86a5b763b36a2d5bc8bd5e101273c89c980cb34fa09a13444ffbf356e244710e5bb6ac9123fbe6904b408af9d61098b9e6f784a551caa4c743d5720f50769292bc4bef34be8db63923fd2106daf70ba"}, @ssp_cap={0x20, 0x10, 0xa, 0x9, 0x5, 0x9, 0x0, 0x2, [0x0, 0xff00f0, 0xc00f, 0x0, 0x1bf0f]}]}}) 02:20:57 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x484, 0x0) fcntl$setlease(r0, 0x4, 0x0) 02:20:57 executing program 0: syz_emit_ethernet(0x4a, &(0x7f00000002c0)={@random="cfa31fa5a2a0", @multicast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2aa65c", 0x14, 0x6, 0x0, @mcast1, @mcast1, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 02:20:57 executing program 1: syz_io_uring_setup(0x320f, &(0x7f0000000280), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000300), &(0x7f0000000340)) 02:20:57 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) [ 879.153131][T19156] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 879.173645][ T8942] usb 4-1: new high-speed USB device number 15 using dummy_hcd [ 879.174458][T19156] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 02:20:57 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000011c0)={0x8, 0x4, &(0x7f0000000240)=@framed={{}, [@generic={0x9}]}, &(0x7f0000000000)='syzkaller\x00', 0x3, 0x1006, &(0x7f0000001240)=""/4102, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 02:20:57 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x38, 0x3, 0x1, 0x5, 0x0, 0x0, {}, [@CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}]}]}, 0x38}}, 0x0) 02:20:57 executing program 5: syz_emit_ethernet(0xa9, &(0x7f0000000180)={@random="cfa31fa5a2a0", @multicast, @void, {@ipv4={0x800, @igmp={{0xe, 0x4, 0x0, 0x0, 0x9b, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x64010101, @dev, {[@rr={0x7, 0x23, 0x17, [@rand_addr, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, @local, @multicast2, @multicast2, @broadcast, @broadcast]}]}}, {0x0, 0x0, 0x0, @remote, "66a601f71ddf36b7930513d0f6725beb50dc93caaee700325f21df3c8a0a9535f8348a67c2947c4715db8b6ff55c6c07a9f0793fa7718a4f6f91023b373b11f12f3b4d48a87c4aefe4925e7c3ccc8103b1c6142a54e0d63cb76cdc"}}}}}, 0x0) [ 879.614136][ T8942] usb 4-1: config 1 interface 0 altsetting 7 bulk endpoint 0x82 has invalid maxpacket 32 [ 879.624505][ T8942] usb 4-1: config 1 interface 0 altsetting 7 bulk endpoint 0x3 has invalid maxpacket 8 [ 879.635724][ T8942] usb 4-1: config 1 interface 0 altsetting 7 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 879.649198][ T8942] usb 4-1: config 1 interface 0 has no altsetting 0 02:20:58 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0xa4) [ 880.094311][ T8942] usb 4-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 880.103787][ T8942] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 880.112043][ T8942] usb 4-1: Product: syz [ 880.116609][ T8942] usb 4-1: Manufacturer: syz [ 880.121358][ T8942] usb 4-1: SerialNumber: syz [ 880.296051][T19168] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 880.317554][T19168] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 880.338085][ T31] audit: type=1804 audit(1605061258.736:14): pid=19190 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir056918529/syzkaller.pVm0am/536/file0" dev="sda1" ino=16274 res=1 errno=0 [ 880.693757][ T8942] cdc_ether: probe of 4-1:1.0 failed with error -71 [ 880.738674][ T8942] usb 4-1: USB disconnect, device number 15 [ 880.807769][T19156] netlink: 'syz-executor.4': attribute type 4 has an invalid length. 02:20:59 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00'}) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000040)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffff0606040000000000000000", 0x39}], 0x1) 02:20:59 executing program 2: r0 = creat(&(0x7f0000000840)='./file0\x00', 0x0) write$cgroup_pid(r0, 0x0, 0x0) 02:20:59 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x20080840) [ 881.413445][ T8943] usb 4-1: new high-speed USB device number 16 using dummy_hcd [ 881.421545][T19207] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 881.437359][T19207] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 881.874101][ T8943] usb 4-1: config 1 interface 0 altsetting 7 bulk endpoint 0x82 has invalid maxpacket 32 [ 881.885571][ T8943] usb 4-1: config 1 interface 0 altsetting 7 bulk endpoint 0x3 has invalid maxpacket 8 [ 881.895956][ T8943] usb 4-1: config 1 interface 0 altsetting 7 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 881.909122][ T8943] usb 4-1: config 1 interface 0 has no altsetting 0 02:21:00 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x5}, 0x40) 02:21:00 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x22004000) 02:21:00 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_KEY_FLUSH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x4) 02:21:00 executing program 0: syz_genetlink_get_family_id$wireguard(&(0x7f0000000180)='wireguard\x00') 02:21:00 executing program 2: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000040)={&(0x7f0000000280)={0xec4, 0x12, 0x0, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0x101, 0x1, "ecf8b60d98abda70ed1780f7991dcab15b2a5d3ce110597c0d9d769f5a5c87ab53b7ddfd60809c2707311ece809d66568eae8d7778470aa55108ec8c3291634edc5801219867551d6c39a1d4584c90d28ab5314fe04f725fd86820639cd3025ab7bf383b3cdbc74b4814a5a604db634067c06a281898d450deba1f73647c46d7e93da99d6d8cdb7d6de0f3a91e065a5ac4625b2793fc96275e73006a89d18e9c6d62e97c689e7b87c93fee854d7aa3c65e5938c58fa5150a61c7ec3ffd99afafb080ebf535ac04c038fec3ed2a2ca93c4af3d50cca901c0f7dca7fb1cddae6c518f5cc63d31827165da403e855fb1c1fd9a0545a82f654d1af25d8cd89"}, @INET_DIAG_REQ_BYTECODE={0x99, 0x1, "9140bc97c8e25ab3b3954eae268e3881eb667672968ceaf6babd8b580295459657d2c625dc8a97c8f02e24f949bcc774569eef7f968a4214d086a94d021a7666c099d377de599a2f0835da58eaa01b8ec04e7f1b96ff85c092f3a4c42c1b2deac510d9b85cc3f124213c2b7389a92ab3da817ea898b5f59ee5cd87c2f95c145d8a3737bfb1007c04d79cc24a905dd9028d822978aa"}, @INET_DIAG_REQ_BYTECODE={0x5d, 0x1, "42cc06203c8a7b3786e2566a0fc1e2d882b2317fae40db92653822a4565b5b44253c2c6eac6805a4e9b9773ae3d89b19dc34aa5e4daad49ebc40c35ba6fb93495efe1ce6fa6c002451a3e6fb22d2bc654c27027f0d648f7dac"}, @INET_DIAG_REQ_BYTECODE={0xad, 0x1, "167e640bf31494a497881cfcb564dd863c15fccb22ea232bfea7c31fb7cda6366b1e3005f4b1c40e4cb1b9e277b4a39fe0696dcac846063b37bd9e8c9950dc86dc2f064552f007036bfc789b8e456d1da73d065633c750a1adb3399abf6c3216f71edd5da5ffee89570efa1e8de756d2634c81a8e77e2b67a68b3476a985dab783763b4c24157086d48da594dd88c79e8dae953beb9ea2927f726ae39f95b14cd2bb43edd07cf3ea80"}, @INET_DIAG_REQ_BYTECODE={0xbc5, 0x1, "dea0087bf349b372c2be1db658d6887f868d95bf160045ba7dd1f6f534167ab88ab8734695a6ae42574553b851b98ec2fb3b05b8120c2fc54f3c5982046e94b4e8cfaa8368ceeaa1ba426182ec11aaeb99a2a6456cbec8433c0171fe00cc2dea141813baa394809acc3521bdee62a1746741a6076cdef838c937df2e349726e739f916cb0ca691721fc9e0f8d559a787356589e9a2e65a96bab3f35e4976b454665f03c9955270a3fc3c34335627c8d15ad3540559558923981ab00d56f91d0db1dc69b5a895341fafe1c1446a71ed9a537aa5a2313af2dcfd2a24f640101ccb54fde4992730e7ed9427790bbce261cd95e37094d53fbe213fc1e9fe3595370c64afe7b2fc9720d4461c7752e0cb4a22e01acc7c059d74674c443cc64f0dcb2664541457b97215a245b508b5a734927f90267bbdd7f37fb1cfd96ecc634e1c851ff92d437243387ded736b495f5fb061ba090c35fe9f55cdf825522364c4935c1d1851e620fe240165e057cd5945f16a1682c47cbf487e39120618f958073fd61ec58e50db0b9a39fb24dedbc27ef6250320f383cc31f835591aebb2b53ba5ce8ab472ee791f92b5f2ad52f79ff48c33b97153185e3ae9f8bff9f19810dc64ddcd26f63f28855430e6b8d17db48d643b3db7d01a7ab7e1e5d9915875e7095257081d43eca86d72af7b8ac375d2c7ed4cd2994fd4a02a9ce3652fb5be79d9899fd4ec1738e577ec725ada8056304c8c55eac254e7a186ee2fcf64aa5ea9b32e96a389024aa76d44009cc3eec2a006914161b0782ac83f46a248da93917d45c24015cb111a606972f21cb279047eaf20d7c80dc9a9375cc4441b87f873a15d1d8f01c384007fb211188b15dbaaf9ec431aeab2d867e765b9a2d25bd68be3d4fd7b238ac95a226e8ad57e65bf6ab2e7c93b11247ea15d0bd1e97555a6e3495732dff5ada35c51b6d3b278bb9cd7c35f273e7130fadfad4262cfb663ac52c3ccdea14bcd2cf6added4b52de0b6dffbb251cc1e742d631d21bd1d68c5e70615da749d355482ddc10b2a00afb98a2ecf8e9187bc9207e5d202032d636ee80ceb861c54acd663e52711ce991f9a630be641abe47228f1708e6e9a858d0be7d74f4e593e325377fc7cd5a69e1090a814d0974e8211492b33859a49412ac0b92fd3bdd2e53f4649a05baf2cdac9c1e64f73de135824865fe7591f8ab2b306b1af99b5bc8587b0bfc64058310b6192dad93eeb7ffdaacd3f899df3195e5dc8dc2bb7c412a76eff0991d9fd08ff57db117dc075538da29e47a04da2205aafed3222b8ce6ce9343e68f0e59589bf5de19e0542fab8ede801e3a1fba783cbd7cade019c57bc4457c2171aded143c8af0e300598b536f5240f49eb3f2c18e6bc46da0fe73b886f92adc4096eb75ab94147a1aa850cff78bd28d74e0fb941831b9b6c3f6a745d1c3c2f81800565b8f5dbb565870078b9d5c5ffeec11f10098d92113374e84b1e790a69681af6e29f813e5e899b64b48a97f5026df1b45ebb7f2f6906901e22ee579f5435d4a0f84ac4cbed368cf7c009a47f8e1beacaf792920a7f805f29fd7de7443bbf455f4691e58c345ce2fb250ba647db97604d2f8700700bf0838d6d822386ac18e6f6e2f4b6214b8a7d3149067458e72ad1d020a051d9ea6c8ec283b56959b4b9a809bf943c0d28f1b0d2d9a535f6fee8a04daadaa44655544063608abab06c0262530dbf0ee1b374d7eddf71a6f72f2aff8098731624869913d996315a7fed696c5aca02964c7bb08cf6b0769a94104e221540a1cf0fe82aea01b8ebf52661842904e26cb93fb8722f9e91b3ce4c360e2ec268346f5987072954de1905a2f2f59ca0f3c5376e49f12f2639173ced38cc853bb400084725659e76d952bfec77e02efdde5f6a39b997d51fafaaaae9a63a08d7a325ad32b4fa22121314b57ae37342fb9891b22d6d8b66a0d4e1f01036ac4db3f9cc1ef1740bac3055633dfabfd81436f3cd97911920c01bdbef936db2e09d8140231e77db7b5e3a042f45baa1888581fdfa6a13c03adf6dd5dbd9efb89c12c794724742bed78a658e5e2de6b5c528f87fb53b37212f932be25e3487eff69f556d6b1dd7bddf2c9c0087e0a500c103fd8997cbf135035a892d23d3f9c78db70e7a24b1837e9e695a6399abd9fc0134b89ffffeb1adee6de5b9a5d3f6090280d188ad44841db90e865ad60b916351ed000630e47d898ca0de8bd43e14ecde35c8b8da827d4958d86aafa9a9eab2423b3d956d424fe8d0ebaa76510fe8c4c6efe83f627a05a5f8014a7ccce6d96b263f6d8f990062983bfa9acce8dab469a59352052623c460e173b1be4dec597850a230527a0a7d7a107061baed584067b18c72f273fd0097a93ee309328ee8a3868095cb04ef0cad67721f43a8aed4d68c527d139005e9931f63dceabc2015aefefb59597afe7b9ea0d3b07035a6087d1612587f80254728a5bc00ad06e4e1a0d6ed814a248c69623a1075a375dfc8cfd291249dda70b65dc4c5dd3f967c87b26f9777a3b732da752f7042009990a9c19c4fde9343465406ed51cd6f735640f86b568d91968ef8f8f5a7eef801cd3bbb63d285731c556a169d663610e5532b7e5838ffca4f26fe2ed54f89e1493eba39d4577bde657c2a7ad2d1a3966b77716deecbd254f8a13278d49792fe4b181de899e9a8a1fef2886ac18fd9b4d18bcdaa054586183c956db59008adc9fb3a2426fe8b57305bc130e3188649b37adad02196af6bd15cacb6986cc9ee8db41c3522ab5d24bb7836a306cf7a8534f82392481887eb0ec6bd7274fabf37bedbcc57c1fcb1f425776b73874bd12914ae2f66e1914d052617113e68e9c097ef417397c13e572da5689b68e4c07414a4e830815055538f1e08ed30f03d319bb919863524c4372ce9ebf9f1b20094ffa12d7f456eea95cf93ce7b67839a19342ba4fb453798c1c4f8ae6e4cd72492a875d8a7cefcbf605b1c3f0d8a6d7127935ae3de1ab93666b3247bd3a59c9730b2238c223abc6d8df77add162a19e7b78a486a628174edbf5380997dbfec875bf26809dc7c6fd599efd9867b7c150aa01aadf2e677abdfcdfe619bbadec68efab75772e6ec67613b21c473aaa900cec3fd9ac3629e97107eeecd4b6251af99b746ba738e875c6218ecbdbcdacedf016a466d0ead8c37db6b8d12328a1e54e8ab7e85aa3545a7642c046f30f5e683f7ac8c166dee96176e043f782318a8e8a7cccaca7e29161d42d32331947548cf56dfb7bd53bd060da3d3671f24f2815053191c57d92e34341f1e90a7e867989285b005354836fc5c8043154fb816a30d3f9ac73a10859b1c241a0be88517d086e79a351d54a177a08ee3fe358df56a4e334f662ad76b908a50ad0a6a575648d40dd9304bb336e4d70c4b203ac1321d186ab427fe9eab5aecca7b51ea0f9175b5937554f4364498df415b0d0b2ef0921a7b41b0ff011e65cfe4df974d8899e8b41518dc01952d1fc1bfdc1a86419d247cd1715a681234cf8d63e3d3e76f7edb26472cb591d3917721450bbaebaf4445906eda1e18f9dc57917d6284c9a8a03fae5d96757abfcf5b4333bb5d5f3160d8ff0a405f06f03e102dc6d9d59c25dab015b196597ee6b34cc27b668f9b68387b1849dc13b0e0e5051e958fe22ddc97677b108bd8f72430ef31e6144307125beee363aec4b364ae178ea986692c61f77f8ccdd78a08aea747d97452bf7484edfc90fbfc3e1e4dd6f1ccf41d020723bee5a880ce087fb00d8f55c17d96f564480848690c7b5ecaf9a5ce6ddbdfefb529b6b7319fe0cbf9e4e2f3ae8f73ff595b689a473ceb2d9b044058409d774c19b95e03410f9b94de1cd79b36970313212d357fe4c83b6924d0ea8c4eb657f89d6cb70c345cbac4ca93a8bd4db7636c642e6b62823a95be6e4f004cbb35e440662c594f30898811fe7087375f7bc31f838766cea915ede860ac36bd7e5480d00ada61a7c308db23698fd521abb4a721fe77894accf750cd0c6e10afdb68234b7637177d82904a225d6d1de18a22a115b7faeb50278e10822d69d8535eea8373fdf9dfe590f0c531a2fbc68693e9ff8c450adf265897a10932c5c589ad978354e9ccbd526fb3ba92db53e394a05b3c26f9a40e39c29c26e2ade541af7351247f5cfcda8ef96f41c395c7562512822b98065936f552f9daf1519500060db978f91729e250347d593fce12a4ce3b3ed3054284089253a73a72ff6ea6"}]}, 0xec4}}, 0x0) 02:21:00 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x20, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x40) [ 882.146772][ T8943] usb 4-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 882.156220][ T8943] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 882.164659][ T8943] usb 4-1: Product: syz [ 882.168981][ T8943] usb 4-1: Manufacturer: syz [ 882.360750][ T8943] usb 4-1: can't set config #1, error -71 [ 882.425536][ T8943] usb 4-1: USB disconnect, device number 16 02:21:00 executing program 1: io_setup(0x34, &(0x7f0000000340)) io_setup(0x2, &(0x7f00000007c0)) 02:21:00 executing program 5: syz_mount_image$romfs(&(0x7f0000000000)='romfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB=',&#--']) 02:21:01 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_SNDBIT(r0, 0x4004556a, 0x0) 02:21:01 executing program 0: open$dir(0x0, 0x11000a, 0x0) 02:21:01 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000001080)={@broadcast, @remote, @val, {@ipv6}}, 0x0) 02:21:01 executing program 3: open$dir(&(0x7f00000000c0)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x82, 0x0) [ 883.048472][T19234] romfs: Unknown parameter '&#--' 02:21:01 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$sock_timeval(r0, 0xffff, 0x1006, &(0x7f0000000180), 0x8) [ 883.174859][T19234] romfs: Unknown parameter '&#--' 02:21:01 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendto$inet6(r0, 0x0, 0x0, 0x101, &(0x7f0000000240)={0x1c, 0x1c}, 0x1c) 02:21:01 executing program 1: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) sendto$inet6(r0, &(0x7f0000000100)="c2596d25cc5a489f652d9bf1a92941245db73642e70e2199769bccd889ca88256215339d4e6cb7a36378b58a853ce5873ec02608da8b9892e3f8551c284ec59714c719d79b1aba236ceb1ac5cfdeae1b9a2857b12ce019e832be", 0x5a, 0x0, &(0x7f0000000200)={0x1c, 0x1c, 0x1}, 0x1c) 02:21:01 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="1b0000002600df"], 0x38}}, 0x0) 02:21:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) 02:21:01 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c00000019000100000000000000000080"], 0x2c}}, 0x0) [ 883.894511][T19265] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 02:21:02 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="50000000200055ed29bd7000fedbdf25020010"], 0x50}}, 0x0) 02:21:02 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c00000019000100000000000000000002"], 0x2c}}, 0x0) 02:21:02 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)=@ipmr_delroute={0x2c, 0x19, 0x1, 0x0, 0x0, {}, [@RTA_MARK={0x8}, @RTA_ENCAP_TYPE={0x6}]}, 0x2c}}, 0x0) 02:21:02 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000012c0)={0x0, 0x0, 0x0, 0x56, &(0x7f0000000040)=""/19, 0x1a}, 0x0) 02:21:02 executing program 3: r0 = open(&(0x7f0000000080)='./file0\x00', 0x41, 0x0) write$FUSE_LSEEK(r0, 0x0, 0x0) 02:21:02 executing program 1: socketpair(0x2, 0x3, 0x1f, 0x0) [ 884.461312][T19273] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.2'. [ 884.478579][T19272] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. 02:21:03 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000002900)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg(r1, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 02:21:03 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_SIGNAL_INFO(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3f2, 0x0, 0x0, 0x0, "", ["", "", ""]}, 0x73}}, 0x0) 02:21:03 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0x0, &(0x7f00000001c0), 0x4) 02:21:03 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) recvfrom(r0, &(0x7f0000000100)=""/138, 0x8a, 0x0, 0x0, 0x0) 02:21:03 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000100)="a0", 0x1}, {&(0x7f0000000080)="e3", 0x1}, {0x0}], 0x3}, 0x0) 02:21:03 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_timeval(r0, 0xffff, 0x1006, 0x0, 0x0) 02:21:03 executing program 0: symlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') lchown(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0xffffffffffffffff) 02:21:04 executing program 2: stat(&(0x7f0000000180)='./file0\x00', 0x0) syz_open_pts(0xffffffffffffffff, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x1000, 0x0) 02:21:04 executing program 4: symlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file1\x00') stat(&(0x7f00000001c0)='./file0\x00', 0x0) 02:21:04 executing program 5: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 02:21:04 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r0, &(0x7f0000000dc0)={0x0, 0x0, 0x0}, 0x0) 02:21:04 executing program 0: perf_event_open$cgroup(&(0x7f00000013c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x0) 02:21:04 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000005e00)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3}, 0x40) 02:21:04 executing program 4: socketpair(0x0, 0x0, 0x0, &(0x7f0000000540)) 02:21:04 executing program 1: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000005040)) 02:21:04 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendto(r0, 0x0, 0x0, 0x2000d, &(0x7f0000000000)=@in={0x10, 0x2}, 0x10) 02:21:05 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x4c}}, 0x0) 02:21:05 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="800000001000010427bd7000fddb810000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000580012800e00010069703665727370616e000000440002800400120008000c0009000000050016000100000008001500e8bd090008033700", @ANYRES32, @ANYBLOB="14000700ff01000000000000000000000000000105000800a900000008000300", @ANYRES32], 0x80}}, 0x0) 02:21:05 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) io_setup(0x2, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f00000005c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000)='V', 0x1, 0x0, 0x0, 0x2}]) 02:21:05 executing program 1: removexattr(&(0x7f0000000880)='./file0\x00', 0x0) 02:21:05 executing program 4: r0 = epoll_create(0x8) epoll_pwait(r0, &(0x7f0000000000)=[{}], 0x1, 0x0, 0x0, 0x0) 02:21:05 executing program 3: bpf$OBJ_GET_PROG(0xd, 0x0, 0x0) 02:21:05 executing program 0: syz_emit_ethernet(0x19, &(0x7f0000000040)={@random="6aeff1e1f95d", @multicast, @val={@val={0x8847}}, {@llc={0x4, {@llc={0x0, 0x0, 'P'}}}}}, 0x0) [ 887.400971][T19326] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 02:21:06 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendmmsg$inet6(r0, &(0x7f000000ad80)=[{{&(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0xa0}, 0x1c, 0x0}}], 0x1, 0x0) 02:21:06 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002940)={0x11, 0x4, &(0x7f0000002800)=@framed={{}, [@func]}, &(0x7f0000002880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 02:21:06 executing program 0: r0 = socket$inet(0x2, 0x3, 0x7) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00'}) 02:21:06 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x1c, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x1, @loopback}]}, &(0x7f0000000100)=0x10) 02:21:06 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000000), &(0x7f0000000040)=0x8) 02:21:06 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000040)=0x1, 0x4) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000040)=@assoc_value, &(0x7f0000000080)=0x8) 02:21:07 executing program 1: r0 = socket$inet(0x2, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x541b, 0x0) 02:21:07 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x22, &(0x7f0000000000)={@remote, @multicast1}, 0xc) 02:21:07 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x6b, 0x0, 0x0) 02:21:07 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) recvmsg(r0, &(0x7f0000008fc0)={0x0, 0x0, 0x0}, 0x0) 02:21:07 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$vsock_stream(0x28, 0x1, 0x0) 02:21:07 executing program 4: getresuid(&(0x7f00000001c0), 0x0, &(0x7f0000000240)) syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0x100, 0x0) r0 = syz_open_dev$swradio(0x0, 0x1, 0x2) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sendmsg$NLBL_MGMT_C_ADD(0xffffffffffffffff, 0x0, 0x0) 02:21:08 executing program 0: socketpair(0x2c, 0x0, 0x0, &(0x7f00000005c0)) 02:21:08 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 02:21:08 executing program 5: socketpair(0x2, 0xa, 0x2, &(0x7f0000000080)) 02:21:08 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 889.976930][T19384] syz-executor.5 uses obsolete (PF_INET,SOCK_PACKET) 02:21:08 executing program 4: 02:21:08 executing program 0: 02:21:08 executing program 5: 02:21:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}], 0x0, &(0x7f0000014a00)) 02:21:08 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000073040)={0x0, [], 0x0, "e35259123d4b7e"}) 02:21:08 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000026c0)={'ip6tnl0\x00', &(0x7f0000002640)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @mcast2}}) 02:21:09 executing program 4: [ 891.134030][T19409] EXT4-fs warning (device loop1): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. 02:21:09 executing program 3: 02:21:09 executing program 5: 02:21:09 executing program 0: [ 891.307101][T19409] EXT4-fs (loop1): mount failed 02:21:09 executing program 5: 02:21:09 executing program 2: [ 891.474708][T19409] EXT4-fs warning (device loop1): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 891.514236][T19409] EXT4-fs (loop1): mount failed 02:21:10 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000001c0)={0x0, 0x0, 0xe}) 02:21:10 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x5414, &(0x7f0000000340)) 02:21:10 executing program 4: socketpair(0x1d, 0x3, 0x1, &(0x7f0000000280)) 02:21:10 executing program 3: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DESTROY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x24, 0x14, 0x1, 0x0, 0x0, {0x10}, [@INET_DIAG_REQ_BYTECODE={0xd, 0x1, "cdbf401d61ce6f5a88"}]}, 0x24}}, 0x0) 02:21:10 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xffff, 0x1, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x3) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x7) 02:21:10 executing program 5: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000001440)={&(0x7f0000000040)={0x48, 0x14, 0x211, 0x0, 0x0, {0xa}, [@INET_DIAG_REQ_BYTECODE={0x31, 0x1, "077908db31846c184e9cda0a14c53a4de3e9e87d77bc5ee36eb7720963fa3b24e173fdde6439bef122fd033b32"}]}, 0x48}}, 0x0) 02:21:10 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xffff, 0x1, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x1) 02:21:10 executing program 3: setresuid(0xffffffffffffffff, 0xee01, 0x0) socketpair(0x11, 0x0, 0x0, &(0x7f0000000380)) 02:21:10 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x3fb, 0x2) ioctl$USBDEVFS_CONTROL(r0, 0x80045519, &(0x7f00000001c0)={0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:21:11 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$MON_IOCX_MFETCH(r0, 0x40189206, &(0x7f00000001c0)={0x0}) [ 892.688354][ T4380] ion_buffer_destroy: buffer still mapped in the kernel 02:21:11 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xffff, 0x1, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x3) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x7) 02:21:11 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xffff, 0x1, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x3) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x7) 02:21:11 executing program 0: setresuid(0x0, 0xee01, 0x0) setresuid(0x0, 0x0, 0xee00) 02:21:11 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="0040000068020000973d00001200000000000000843d00000001000073564d38e10000001e000000000000000010cc030200010052654973457233467300000002000000020001000200853d00000000010000001231231212331233123112341341241273797a6b616c6c65720000000000000001001e003bc1655f004eed00", 0x80, 0x10000}, {&(0x7f0000010100)="000000000000000000000000010000000300"/32, 0x20, 0x100c0}, {&(0x7f0000010200)="ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff00"/1984, 0x7c0, 0x11000}, {&(0x7f0000010a00)="ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x800, 0x11800}, {&(0x7f0000011200)="0000000000000000000000001200000000000000843d00000001000073564d38e10000001e00"/64, 0x40, 0x3d96000}, {&(0x7f0000011300)="010002005c0f0000000000000000000000000000000000000100000002000000000000000000000000002c00d40f0100010000000200000001000000f401000002003000a40f00"/96, 0x60, 0x3d97000}, {&(0x7f0000011400)="0000000001000000010000000200000028000400020000000000000001000000200004002e2e0000000000002e00000000000000ed4100000300000030000000000000005cf90100535f01003bc1655f3bc1655f3bc1655f0100000000000000", 0x60, 0x3d97fa0}], 0x0, &(0x7f0000011500)) 02:21:11 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hpfs(&(0x7f0000000440)='hpfs\x00', &(0x7f0000000480)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000005c0)={[], [{@smackfsfloor={'smackfsfloor', 0x3d, ':{}'}}]}) 02:21:11 executing program 4: shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x6000) shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x7000) 02:21:11 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xffff, 0x1, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x3) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x7) [ 893.639671][T19462] hpfs: bad mount options. 02:21:12 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xffff, 0x1, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x3) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x7) [ 893.680710][T19463] REISERFS (device loop1): found reiserfs format "3.6" with non-standard journal [ 893.699382][T19463] REISERFS (device loop1): using ordered data mode [ 893.706226][T19463] reiserfs: using flush barriers [ 893.815526][T19463] REISERFS (device loop1): journal params: device loop1, size 15748, journal first block 18, max trans len 256, max batch 225, max commit age 30, max trans age 30 02:21:12 executing program 0: setresuid(0x0, 0xee01, 0x0) socketpair(0xa, 0x3, 0xe9, &(0x7f0000000000)) 02:21:12 executing program 3: r0 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x2, 0x141042) write$midi(r0, &(0x7f0000000080)='3', 0x1) 02:21:12 executing program 4: r0 = syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1d, 0x0, 0x1ff}}) 02:21:12 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xffff, 0x1, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x3) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x7) [ 894.062815][T19463] REISERFS (device loop1): checking transaction log (loop1) 02:21:12 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xffff, 0x1, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x3) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x7) [ 894.561636][T19482] rtc_cmos 00:00: Alarms can be up to one day in the future 02:21:13 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xffff, 0x1, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x7) 02:21:13 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xffff, 0x1, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x3) [ 901.827178][T19463] ===================================================== [ 901.834262][T19463] BUG: KMSAN: uninit-value in search_by_key+0x301e/0x67f0 [ 901.842170][T19463] CPU: 0 PID: 19463 Comm: syz-executor.1 Not tainted 5.9.0-rc8-syzkaller #0 [ 901.850837][T19463] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 901.861002][T19463] Call Trace: [ 901.864360][T19463] dump_stack+0x21c/0x280 [ 901.868726][T19463] kmsan_report+0xf7/0x1e0 [ 901.873196][T19463] __msan_warning+0x5f/0xa0 [ 901.877708][T19463] search_by_key+0x301e/0x67f0 [ 901.882495][T19463] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 901.888655][T19463] ? kmsan_get_metadata+0x116/0x180 [ 901.893861][T19463] ? kmsan_internal_set_origin+0x85/0xc0 [ 901.899497][T19463] ? kmsan_get_metadata+0x116/0x180 [ 901.904704][T19463] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 901.910691][T19463] reiserfs_read_locked_inode+0x1fc/0x30b0 [ 901.916505][T19463] ? reiserfs_update_sd_size+0x1340/0x1340 [ 901.922407][T19463] ? reiserfs_read_locked_inode+0x30b0/0x30b0 [ 901.928474][T19463] ? kmsan_get_metadata+0x116/0x180 [ 901.933684][T19463] ? kmsan_internal_set_origin+0x85/0xc0 [ 901.939337][T19463] reiserfs_fill_super+0x2ad7/0x6160 [ 901.944635][T19463] ? kmsan_get_metadata+0x116/0x180 [ 901.949835][T19463] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 901.955652][T19463] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 901.961795][T19463] ? set_blocksize+0x464/0x780 [ 901.966563][T19463] ? kmsan_get_metadata+0x116/0x180 [ 901.971763][T19463] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 901.977576][T19463] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 901.983733][T19463] ? sb_set_blocksize+0x1c5/0x230 [ 901.988826][T19463] mount_bdev+0x619/0x900 [ 901.993162][T19463] ? reiserfs_kill_sb+0x260/0x260 [ 901.998195][T19463] get_super_block+0xc9/0xe0 [ 902.002789][T19463] legacy_get_tree+0x163/0x2e0 [ 902.007557][T19463] ? remove_save_link+0x600/0x600 [ 902.012588][T19463] ? legacy_parse_monolithic+0x310/0x310 [ 902.018222][T19463] vfs_get_tree+0xd8/0x5d0 [ 902.022697][T19463] path_mount+0x3dde/0x5db0 [ 902.027212][T19463] do_mount+0x1c6/0x220 [ 902.031425][T19463] __se_compat_sys_mount+0x7bb/0xaa0 [ 902.036723][T19463] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 902.042794][T19463] __ia32_compat_sys_mount+0x62/0x80 [ 902.048148][T19463] __do_fast_syscall_32+0x129/0x180 [ 902.053359][T19463] do_fast_syscall_32+0x6a/0xc0 [ 902.058216][T19463] do_SYSENTER_32+0x73/0x90 [ 902.062779][T19463] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 902.069108][T19463] RIP: 0023:0xf7fa6549 [ 902.073180][T19463] Code: b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 902.092792][T19463] RSP: 002b:00000000f559ff20 EFLAGS: 00000292 ORIG_RAX: 0000000000000015 [ 902.101213][T19463] RAX: ffffffffffffffda RBX: 00000000f559ff7c RCX: 0000000020000100 [ 902.109192][T19463] RDX: 0000000020000000 RSI: 0000000000000000 RDI: 00000000f559ffbc [ 902.117172][T19463] RBP: 00000000f559ff7c R08: 0000000000000000 R09: 0000000000000000 [ 902.125149][T19463] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 902.133125][T19463] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 902.141097][T19463] [ 902.143422][T19463] Local variable ----key@reiserfs_read_locked_inode created at: [ 902.151061][T19463] reiserfs_read_locked_inode+0xb4/0x30b0 [ 902.156789][T19463] reiserfs_read_locked_inode+0xb4/0x30b0 [ 902.162499][T19463] ===================================================== [ 902.169428][T19463] Disabling lock debugging due to kernel taint [ 902.175580][T19463] Kernel panic - not syncing: panic_on_warn set ... [ 902.182176][T19463] CPU: 0 PID: 19463 Comm: syz-executor.1 Tainted: G B 5.9.0-rc8-syzkaller #0 [ 902.192231][T19463] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 902.202288][T19463] Call Trace: [ 902.205592][T19463] dump_stack+0x21c/0x280 [ 902.209930][T19463] panic+0x4c8/0xea7 [ 902.213838][T19463] ? add_taint+0x17c/0x210 [ 902.218260][T19463] kmsan_report+0x1da/0x1e0 [ 902.222782][T19463] __msan_warning+0x5f/0xa0 [ 902.227299][T19463] search_by_key+0x301e/0x67f0 [ 902.232087][T19463] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 902.238246][T19463] ? kmsan_get_metadata+0x116/0x180 [ 902.243459][T19463] ? kmsan_internal_set_origin+0x85/0xc0 [ 902.249093][T19463] ? kmsan_get_metadata+0x116/0x180 [ 902.254299][T19463] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 902.260115][T19463] reiserfs_read_locked_inode+0x1fc/0x30b0 [ 902.265931][T19463] ? reiserfs_update_sd_size+0x1340/0x1340 [ 902.271745][T19463] ? reiserfs_read_locked_inode+0x30b0/0x30b0 [ 902.277827][T19463] ? kmsan_get_metadata+0x116/0x180 [ 902.283043][T19463] ? kmsan_internal_set_origin+0x85/0xc0 [ 902.288691][T19463] reiserfs_fill_super+0x2ad7/0x6160 [ 902.293996][T19463] ? kmsan_get_metadata+0x116/0x180 [ 902.299207][T19463] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 902.305029][T19463] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 902.311110][T19463] ? set_blocksize+0x464/0x780 [ 902.315882][T19463] ? kmsan_get_metadata+0x116/0x180 [ 902.321201][T19463] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 902.327022][T19463] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 902.333182][T19463] ? sb_set_blocksize+0x1c5/0x230 [ 902.338217][T19463] mount_bdev+0x619/0x900 [ 902.342550][T19463] ? reiserfs_kill_sb+0x260/0x260 [ 902.347580][T19463] get_super_block+0xc9/0xe0 [ 902.352174][T19463] legacy_get_tree+0x163/0x2e0 [ 902.356939][T19463] ? remove_save_link+0x600/0x600 [ 902.361968][T19463] ? legacy_parse_monolithic+0x310/0x310 [ 902.367604][T19463] vfs_get_tree+0xd8/0x5d0 [ 902.372028][T19463] path_mount+0x3dde/0x5db0 [ 902.376541][T19463] do_mount+0x1c6/0x220 [ 902.380706][T19463] __se_compat_sys_mount+0x7bb/0xaa0 [ 902.386004][T19463] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 902.392081][T19463] __ia32_compat_sys_mount+0x62/0x80 [ 902.397374][T19463] __do_fast_syscall_32+0x129/0x180 [ 902.402583][T19463] do_fast_syscall_32+0x6a/0xc0 [ 902.407445][T19463] do_SYSENTER_32+0x73/0x90 [ 902.411956][T19463] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 902.418291][T19463] RIP: 0023:0xf7fa6549 [ 902.422371][T19463] Code: b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 902.441982][T19463] RSP: 002b:00000000f559ff20 EFLAGS: 00000292 ORIG_RAX: 0000000000000015 [ 902.450404][T19463] RAX: ffffffffffffffda RBX: 00000000f559ff7c RCX: 0000000020000100 [ 902.458383][T19463] RDX: 0000000020000000 RSI: 0000000000000000 RDI: 00000000f559ffbc [ 902.466361][T19463] RBP: 00000000f559ff7c R08: 0000000000000000 R09: 0000000000000000 [ 902.474343][T19463] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 902.482322][T19463] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 902.490951][T19463] Kernel Offset: disabled [ 902.495274][T19463] Rebooting in 86400 seconds..